SAP Security
and GRC Course Content
1 SAP R/3 Security
1.1 Overview of SAP
1.2 Overview of SAP BASIS
1.3 Introduction to SAP Security
1.3.1 Why we need security
1.3.2 What needs to be protected
1.3.3 From whom we need to protect
1.3.4 Implementation methodology
1.4 User administration
1.4.1 Single user administration
1.4.2 Mass User administration
1.4.3 LSMW Script running
1.5 Introduction of CUA (Central User administration)
1.5.1 CUA Configuration for different landscapes
1.5.2 Performing user administration activities in CUA
1.5.3 Distributing User/IDOCS and troubleshooting issues
1.6 User Groups Concept
1.7 Role Administration and authorizations concept
1.7.1 Overview of authorizations and roles
1.7.2 Change management process
1.7.3 Creating custom authorization objects
1.7.4 SAP Role types
1.7.5 Working with Profile Generator
1.7.6 Creating and modifying different roles
1.8 Authorization Group Concept
1.9 Missing authorization
1.10 Tracing the user for missing authorization.
1.11 Working with R/3 tables, parameters and Reports
1.12 SAP Security Audit.
2. BW/BI Security
2.1 Architecture and strategies for a BI authorization concept
2.2 Security requirements in SAP BI
2.3 Standard roles and templates for the authorization concept
2.4 Creating BW/BI roles and modification
2.5 Difference between BW and R/3 security
2.6 Difference between BW and BI Security
2.7 Different authorization objects involved in BW/BI
2.8 Analysis authorization concept and reporting
2.9 Troubleshooting BW/BI issues
1.1 Overview of SAP
1.2 Overview of SAP BASIS
1.3 Introduction to SAP Security
1.3.1 Why we need security
1.3.2 What needs to be protected
1.3.3 From whom we need to protect
1.3.4 Implementation methodology
1.4 User administration
1.4.1 Single user administration
1.4.2 Mass User administration
1.4.3 LSMW Script running
1.5 Introduction of CUA (Central User administration)
1.5.1 CUA Configuration for different landscapes
1.5.2 Performing user administration activities in CUA
1.5.3 Distributing User/IDOCS and troubleshooting issues
1.6 User Groups Concept
1.7 Role Administration and authorizations concept
1.7.1 Overview of authorizations and roles
1.7.2 Change management process
1.7.3 Creating custom authorization objects
1.7.4 SAP Role types
1.7.5 Working with Profile Generator
1.7.6 Creating and modifying different roles
1.8 Authorization Group Concept
1.9 Missing authorization
1.10 Tracing the user for missing authorization.
1.11 Working with R/3 tables, parameters and Reports
1.12 SAP Security Audit.
2. BW/BI Security
2.1 Architecture and strategies for a BI authorization concept
2.2 Security requirements in SAP BI
2.3 Standard roles and templates for the authorization concept
2.4 Creating BW/BI roles and modification
2.5 Difference between BW and R/3 security
2.6 Difference between BW and BI Security
2.7 Different authorization objects involved in BW/BI
2.8 Analysis authorization concept and reporting
2.9 Troubleshooting BW/BI issues
3 HR Security
3.1 Introduction to HR security
3.2 Personal administration and Organizational management
3.3 HR General and Structural authorizations
3.4 HR authorization objects and info types
3.5 Troubleshooting HR issues
4 GRC (Governance, Risks and Compliances 5.3)
4.1 Introduction to GRC
4.2 Sarbanes Oxley Rules (SOX)
4.3 In depth discussion of GRC Components
4.3.1 Compliance User Provisioning (CUP)
4.3.2 Risk Analysis and Remediation (RAR)
4.3.3 Enterprise Role management (ERM)
4.3.4 Super User Privilege Management (SPM)
4.4 Working with functions, Risks and Mitigation Controls
4.5 Introduction to GRC 10.
3.1 Introduction to HR security
3.2 Personal administration and Organizational management
3.3 HR General and Structural authorizations
3.4 HR authorization objects and info types
3.5 Troubleshooting HR issues
4 GRC (Governance, Risks and Compliances 5.3)
4.1 Introduction to GRC
4.2 Sarbanes Oxley Rules (SOX)
4.3 In depth discussion of GRC Components
4.3.1 Compliance User Provisioning (CUP)
4.3.2 Risk Analysis and Remediation (RAR)
4.3.3 Enterprise Role management (ERM)
4.3.4 Super User Privilege Management (SPM)
4.4 Working with functions, Risks and Mitigation Controls
4.5 Introduction to GRC 10.