SAP Security Online Training

SAP Security  Training

Enrollmytraining provide SAP Security online training by real time experts in IT industry .We provide SAP Security online Training in across the World like India,USA, UK, Singapore, UAE, Australia, Europe, Japan, South Africa,Malaysia, Dubai .The student who had taken Adwords training got placed in top MNC’s .We provide SAP Security online training at your comfortable timing from your home with flexible schedules.

Overview of the GRC
Introduction to ERP
Security Introduction
SAP Project Lifecycle
Default user-id’s and clients
User types
Creating user-id’s
Overview of SAP Security (Roles and Profiles)
Authorization concepts, transactions, authorization objects
Introduction to Profile Generator
Introduction to Composite and derived roles
Practical exercise building roles, composite and derived
Adding Missing Authorisation Objects
System Trace and SU53
Inactivating Authorisation objects
Creating and assigning users to roles
use of PFCG_TIME_DEPENDENCY
use of User Groups in Security
How SU25,SU24 and PFCG are linked
Use of se16 and S_TABU_DIS
Use of SM30 and SM31
Continue review of Useful tables for security
Use of Compare
Use of SUIM reports
System security settings SCC4,SCC1,SE03,SE06
Use of SE11,SE54,and security table groups
use of SUPC
Audit requirements
USMM Report
License_admin tool
User classification
Transporting roles
Use of SAP_ALL and SAP_NEW
How to delete Roles
Use of SAP* and DDIC
USR*,AGR*,USH* Tables
Evaluation Reports RSUSR002,RSUSR040,RSUSR003
Overview of the SAP-HR SECURITY
Overview of SAP-HR Security
Pre-requisites to implement HR Security
Indirect assignment of standard HR Roles to Organizational Objects
Creating structural profiles and assigning to users
Executing report in SA38 for comparing users in structural
profiles Overview SAP-BI SECURITY
Overview of Analysis Authorisations
Difference between OLTP and OLAP
Overview of info objects, info cubes and hierarchies
Administrative workbench Authorisations
Report level Authorisations at infoobject,infocube and Info provider level
Overview of the GRC
Overview of SOX
Overview of SOD
Introduction to GRC AC 5.3
Introduction of different components in GRC AC
Risk Analysis Remediation process in GRC AC
Compliant User Provisioning (CUP)
Enterprise Role Management (ERM)
Super User Privilege Management(SPM)
Background Jobs for GRC 5.3

Leave a Reply

Your email address will not be published. Required fields are marked *