SAP Security Online Training

SAP Security and Auithorization’s Course gives technical consultants environment, IT managers, administrators and authorization of in-depth look at all aspects of IT security in the SAP NetWeaver.

SAP SECURITY Online Training Course Content
  • SAP R/3 Security
    • Overview of SAP
    • Introduction to SAP Security
    • Why we need security
    • What needs to be protected
    • From whom we need to protect
    • User administration
    • Singe user administration
    • Mass User administration
    • LSMW Script running
    • Introduction of CUA (Central User administration)
    • CUA Configuration for different landscapes
    • Performing user administration activities in CUA
    • Distributing User/IDOCS and troubleshooting issues
    • User Groups Concept
    • Overview of authorizations and roles
    • Change management process
    • Creating custom authorization objects
    • SAP Role types
    • Working with Profile Generator
    • Creating and modifying different roles
    • Authorization Group Concept
    • Missing authorization
    • Tracing the user for missing authorization.
    • Working with R/3 tables, parameters and Reports
    • SAP Security Audit
  • BW/BI Security
    • Architecture and strategies for a BI authorization concept
    • Standard roles and templates for the authorization concept
    • Creating BW/BI roles and modification
    • Difference between BW and R/3 security
    • Difference between BW and BI Security
    • Different authorization objects involved in BW/BI
    • Analysis authorization concept and reporting
    • Troubleshooting BW/BI issues
  • Security
    • Introduction to HR security
    • Personal administration and
    • HR General and Structural authorizations
    • HR authorization objects and info types
    • Troubleshooting HR issues
  • GRC (Governance, Risks and Compliances 5.3
    • Introduction to GRC
    • Sarbanes Oxley Rules (SOX)
    • In depth discussion of GRC
    • Compliance User Provisioning (CUP)
    • Risk Analysis and Remediation (RAR)
    • Enterprise Role management (ERM)
    • Working with functions, Risks and
    • Mitigation Controls
    • Introduction to GRC 10.

Please Register with us