SAP BASIS Security Online Training In USA

SAP BASIS Security Online Training

SAP BASIS Security Online Training
SAP BASIS Security Online Training

SAP BASIS Security Online Training Course Content :

SAP R/3 Security

  • Overview of SAP
  • Overview of SAP BASIS
  • Introduction to SAP Security
    • Why we need security
    • What needs to be protected
    • From whom we need to protect
    • Implementation methodology
  • User administration
    • Single user administration
    • Mass User administration
    • LSMW Script running
  • Introduction of CUA (Central User administration)
    • CUA Configuration for different landscapes
    • Performing user administration activities in CUA
    • Distributing User/IDOCS and troubleshooting issues
  • User Groups Concept
  • Role Administration and authorizations concept
    • Overview of authorizations and roles
    • Change management process
    • Creating custom authorization objects
    • SAP Role types
    • Working with Profile Generator
    • Creating and modifying different roles
  • Authorization Group Concept
  • Missing authorization
  • Tracing the user for missing authorization.
  • Working with R/3 tables, parameters and Reports
  • SAP Security Audit

BW/BI Security

  • Architecture and strategies for a BI  authorization concept
  • Security requirements in SAP BI
  • Standard roles and templates for the  authorization concept
  • Creating BW/BI roles and modification
  • Difference between BW and R/3 security
  • Difference between BW and BI Security
  • Different authorization objects involved  in  BW/BI
  • Analysis authorization concept and  reporting
  • Troubleshooting BW/BI issues

HR Security

  • Introduction to HR security
  • Personal administration and  Organizational management
  • HR General and Structural authorizations
  • HR authorization objects and info types
  • Troubleshooting HR issues

GRC (Governance, Risks and Compliances 5.3

  • Introduction to GRC
  • Sarbanes Oxley Rules (SOX)
  • In depth discussion  of GRC  Components
    • Compliance User Provisioning (CUP)
    • Risk Analysis and Remediation (RAR)
    • Enterprise Role management (ERM)
    • Super User Privilege Management  (SPM)
  • Working with functions, Risks and Mitigation Controls
  • Introduction to GRC 10.

Drop your query

What my Client's Say?

 

  • It was a great course over my expectations. I am eager to have another course wıth you as soon as possıble ~ R. Kamand

  • All in all, it was a very constructive and one in a lifetime experience. I'm so glad that I was part of it.~ T. Engin

  • It was the best decision I had ever made in my life. Although it was expensive for me, but I don't regret even for one second. ~ Maruti Malla

  • Thank you for this great course. I learned a lot of things, I met very nice people and I am happy that I had these 6 crazy weeks with you.".~ Najmul Shar A Baig

  • Very nice and friendly tutor and staff. The course was very fruitful, particularly the input sessions during the first half of it.~ Radha Nandyala

  • It was such great experience, though it was really intensive, it was worth doing it! Cant thank enough all team effort esp Mohan! .~ Rohan Kumar

  • The course was really good because it was a practical course.~ M.Radha patel

  • I liked this experience. Good tutor and nice mates. I will always remember it. ~ Jitu Bavaria