SAP Security
and GRC Course Content
1 SAP R/3 Security
1.1 Overview of SAP
1.2 Overview of SAP BASIS
1.3 Introduction to SAP Security
1.3.1 Why we need security
1.3.2 What needs to be protected
1.3.3 From whom we need to protect
1.3.4 Implementation methodology
1.4 User administration
1.4.1 Single user administration
1.4.2 Mass User administration
1.4.3 LSMW Script running
1.5 Introduction of CUA (Central User administration)
1.5.1 CUA Configuration for different landscapes
1.5.2 Performing user administration activities in CUA
1.5.3 Distributing User/IDOCS and troubleshooting issues
1.6 User Groups Concept
1.7 Role Administration and authorizations concept
1.7.1 Overview of authorizations and roles
1.7.2 Change management process
1.7.3 Creating custom authorization objects
1.7.4 SAP Role types
1.7.5 Working with Profile Generator
1.7.6 Creating and modifying different roles
1.8 Authorization Group Concept
1.9 Missing authorization
1.10 Tracing the user for missing authorization.
1.11 Working with R/3 tables, parameters and Reports
1.12 SAP Security Audit.
2. BW/BI Security
2.1 Architecture and strategies for a BI authorization concept
2.2 Security requirements in SAP BI
2.3 Standard roles and templates for the authorization concept
2.4 Creating BW/BI roles and modification
2.5 Difference between BW and R/3 security
2.6 Difference between BW and BI Security
2.7 Different authorization objects involved in BW/BI
2.8 Analysis authorization concept and reporting
2.9 Troubleshooting BW/BI issues
1.1 Overview of SAP
1.2 Overview of SAP BASIS
1.3 Introduction to SAP Security
1.3.1 Why we need security
1.3.2 What needs to be protected
1.3.3 From whom we need to protect
1.3.4 Implementation methodology
1.4 User administration
1.4.1 Single user administration
1.4.2 Mass User administration
1.4.3 LSMW Script running
1.5 Introduction of CUA (Central User administration)
1.5.1 CUA Configuration for different landscapes
1.5.2 Performing user administration activities in CUA
1.5.3 Distributing User/IDOCS and troubleshooting issues
1.6 User Groups Concept
1.7 Role Administration and authorizations concept
1.7.1 Overview of authorizations and roles
1.7.2 Change management process
1.7.3 Creating custom authorization objects
1.7.4 SAP Role types
1.7.5 Working with Profile Generator
1.7.6 Creating and modifying different roles
1.8 Authorization Group Concept
1.9 Missing authorization
1.10 Tracing the user for missing authorization.
1.11 Working with R/3 tables, parameters and Reports
1.12 SAP Security Audit.
2. BW/BI Security
2.1 Architecture and strategies for a BI authorization concept
2.2 Security requirements in SAP BI
2.3 Standard roles and templates for the authorization concept
2.4 Creating BW/BI roles and modification
2.5 Difference between BW and R/3 security
2.6 Difference between BW and BI Security
2.7 Different authorization objects involved in BW/BI
2.8 Analysis authorization concept and reporting
2.9 Troubleshooting BW/BI issues
3 HR Security
3.1 Introduction to HR security
3.2 Personal administration and Organizational management
3.3 HR General and Structural authorizations
3.4 HR authorization objects and info types
3.5 Troubleshooting HR issues
4 GRC (Governance, Risks and Compliances 5.3)
4.1 Introduction to GRC
4.2 Sarbanes Oxley Rules (SOX)
4.3 In depth discussion of GRC Components
4.3.1 Compliance User Provisioning (CUP)
4.3.2 Risk Analysis and Remediation (RAR)
4.3.3 Enterprise Role management (ERM)
4.3.4 Super User Privilege Management (SPM)
4.4 Working with functions, Risks and Mitigation Controls
4.5 Introduction to GRC 10.
3.1 Introduction to HR security
3.2 Personal administration and Organizational management
3.3 HR General and Structural authorizations
3.4 HR authorization objects and info types
3.5 Troubleshooting HR issues
4 GRC (Governance, Risks and Compliances 5.3)
4.1 Introduction to GRC
4.2 Sarbanes Oxley Rules (SOX)
4.3 In depth discussion of GRC Components
4.3.1 Compliance User Provisioning (CUP)
4.3.2 Risk Analysis and Remediation (RAR)
4.3.3 Enterprise Role management (ERM)
4.3.4 Super User Privilege Management (SPM)
4.4 Working with functions, Risks and Mitigation Controls
4.5 Introduction to GRC 10.
This information which you provided is very much useful for us.It was very interesting and useful for sap online training.We also providing sap online training institute in USA.
ReplyDeleteThis post is the clearly, but only listed training list.
ReplyDeletewe provide the sap grc online training.
vweb site visit us:
sap-grc-online-training
Thank u for giving this best information..we are offering the best sap grc online training...
ReplyDeleterecently i came your blog and have been read along it's very interesting..we are giving the best sap grc online training ...
ReplyDeletethis blog contains very interesting information...we are giving the best sap grc online training
ReplyDeletethanks for sharing...we are giving sap grc online training
ReplyDeleteThanks for Share this information. It’s a very nice topic. Who wants search sap-grc-online-training
ReplyDeleteThank you for very nice information.
ReplyDeleteIt is very useful to me and who are searching for SAP GRC online training
Hi Guys, We provide SAP Security/BI Security & CRM Security training, Please reach us at luckee141@gmail.com for online training information
ReplyDeleteThank you for sharing very use full information sap basis online training
ReplyDeleteI really appreciate information shared above. It’s of great help. If someone want to learn Online (Virtual) instructor led live training in SAP GRC , kindly Contact GRONYSA
ReplyDeleteClick for SAP GRC Course details SAP GRC
GRONYSA Offer World Class Virtual Instructor led training on SAP GRC. We have industry expert trainer. We provide Training Material and Software Support. GRONYSA has successfully conducted 10,000 + trainings in India, USA, UK, Australlia, Switzerland, Qatar, Saudi Arabia, Bangladesh, Bahrain and UAE etc.
For Demo Contact us.
Nitesh Kumar
GRONYSA
E-mail: nitesh.kumar@gronysa.com
Ph: +91-9632072659/ +1-2142700660
www.GRONYSA.com
Hello,
ReplyDeleteThanks for providing information. Nice Blog. We provide SAP Security Online Training in various parts of the country like India, USA, UK.
It was Nice post and very useful information on sap learning videos.
ReplyDeleteThank you. for Sharing Great Information. It is Very Helpful Information on sap training videos.
ReplyDeleteI am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
ReplyDeleteCyber Security Projects for CSE
JavaScript Training in Chennai
Project Centers in Chennai for CSE
JavaScript Training in Chennai
Thank you. sir, Really I like your post on sap server access for practice in India.
ReplyDeleteazure online course
ReplyDeletejava online course
salesforce online course
hadoop online course
Data Science online course