SAP SECURITY ONLINE TRAINING CLASSES IN USA|AUSTRALIA|CANADA|UK

SAP Security Online Training
SAP Security Online Training Course Details
  • Overview of the GRC:
      Introduction to ERP
      Security Introduction
      SAP Project Lifecycle
      Default user-id's and clients
      User types
      Creating user-id's
      Overview of SAP Security (Roles and Profiles)
      Authorization concepts, transactions, authorization objects
      Introduction to Profile Generator
      Introduction to Composite and derived roles
      Practical exercise building roles, composite and derived
      Adding Missing Authorisation Objects
      System Trace and SU53
      Inactivating Authorisation objects
      Creating and assigning users to roles
      use of PFCG_TIME_DEPENDENCY
      use of User Groups in Security
      How SU25,SU24 and PFCG are linked
      Use of se16 and S_TABU_DIS
      Use of SM30 and SM31
      Continue review of Useful tables for security
      Use of Compare
      Use of SUIM reports
      System security settings SCC4,SCC1,SE03,SE06
      Use of SE11,SE54,and security table groups
      use of SUPC
      Audit requirements
      USMM Report
      License_admin tool
      User classification
      Transporting roles
      Use of SAP_ALL and SAP_NEW
      How to delete Roles
      Use of SAP* and DDIC
      USR*,AGR*,USH* Tables
      Evaluation Reports RSUSR002,RSUSR040,RSUSR003
  • Overview of the SAP-HR SECURITY
      Overview of SAP-HR Security
      Pre-requisites to implement HR Security
      Indirect assignment of standard HR Roles to Organizational Objects
      Creating structural profiles and assigning to users
      Executing report in SA38 for comparing users in structural
  • profiles Overview SAP-BI SECURITY
      Overview of Analysis Authorisations
      Difference between OLTP and OLAP
      Overview of info objects, info cubes and hierarchies
      Administrative workbench Authorisations
      Report level Authorisations at infoobject,infocube and Info provider level
  • Overview of the GRC
      Overview of SOX
      Overview of SOD
      Introduction to GRC AC 5.3
      Introduction of different components in GRC AC
      Risk Analysis Remediation process in GRC AC
      Compliant User Provisioning (CUP)
      Enterprise Role Management (ERM)
      Super User Privilege Management(SPM)
      Background Jobs for GRC 5.3

full courses details please visit our
website:www.sitctraining.com,For any further details please 
Email id:info@spectoittraining.com
contact India +91-9533456356,
        USA :+1-847-787-7647.

Share this

Related Posts

Previous
Next Post »