SAP SECURITY WITH GRC

SAP SECURITY WITH GRC

SAP SECURITY WITH GRC ONLINE TRAINING

  •    Rating
  •   Duration 35-40 Hours
  •      Fee $ 450

Request Free Demo

SAP SECURITY WITH GRC TRAINING VIDEOS

  •    Rating
  •   Duration 25 Hours
  •      Fee $ 350

Buy Now



What Is SAP SECURITY WITH GRC Training

SAP GRC are into more focus since the companies has understood the importance of securing their business data and information from any kind of threats. SAP Security is a module of SAP that deal with securing business data. Obviously, business data is stored into some database like Oracle, Sybase etc. In SAP Security we are the access administrator. Roles contains access and when these roles are assigned to users, users can perform their job. Third, being a SAP Security Consultant you have to do audits of your system time to time. May be monthly, quarterly, bi annually or annually.

SAP SECURITY WITH GRC Course Content

Week-1

Introduction of the GRC

Introduction to ERP

Security Introduction

SAP Project Lifecycle

Default user-id’s and clients

User types

Creating user-id’s

Overview of SAP Security (Roles and Profiles)

Authorization concepts, transactions, authorization objects

Introduction to Profile Generator

Introduction to Composite and derived roles

Practical exercise building roles, composite and derived

Adding Missing Authorisation Objects

System Trace and SU53

Inactivating Authorisation objects

Creating and assigning users to roles

use of PFCG_TIME_DEPENDENCY

use of User Groups in Security

How SU25,SU24 and PFCG are linked

Use of se16 and S_TABU_DIS

Use of SM30 and SM31

Continue review of Useful tables for security

Use of Compare

Use of SUIM reports

System security settings SCC4,SCC1,SE03,SE06

Use of SE11,SE54,and security table groups

use of SUPC

Audit requirements

USMM Report

License_admin tool

User classification

Transporting roles

Use of SAP_ALL and SAP_NEW

How to delete Roles

Use of SAP* and DDIC

USR*,AGR*,USH* Tables

Evaluation Reports RSUSR002,RSUSR040,RSUSR003

Week-2

profiles Overview SAP-BI SECURITY

Overview of Analysis Authorisations

Difference between OLTP and OLAP

Overview of info objects, info cubes and hierarchies

Administrative workbench Authorisations

Report level Authorisations at infoobject,infocube and Info provider level

Overview of the SAP-HR SECURITY

Overview of SAP-HR Security

Pre-requisites to implement HR Security

Indirect assignment of standard HR Roles to Organizational Objects

Creating structural profiles and assigning to users

Executing report in SA38 for comparing users in structural

Week-3

Overview of the GRC

Overview of SOX

Overview of SOD

Introduction to GRC AC 5.3

Introduction of different components in GRC AC

Risk Analysis Remediation process in GRC AC

Compliant User Provisioning (CUP)

Enterprise Role Management (ERM)

Super User Privilege Management(SPM)

Background Jobs for GRC 5.3

Quick Enquiry