“
Very interesting class... For those who do not know SAP, this class will give you an excellent hands-on opportunity to not only learn what the end-user does but how the system itself is setup and how the data flows through the systems. EXCELLENT CLASS!!!!!! Ms. R. Patel - Excellent Job! ”- Art Clay
Why SAP Security with GRC
SAP Security with GRC training course will prepare you to understand the security concepts in SAP applications, to build a strong knowledge-base on security so that it can be utilized for further developing security on any of the new SAP applications.
Please call at +1-832-419-7371 to speak with one of our friendly education counselor.
Prerequisites
Basic knowledge of SAP overview SAP BASIS, SAP BI, and other technical modules is always recommended.
Course Curriculum
Day-1: SAP Overview, Introduction to SAP Security
- Overview of SAP
- Overview of BASIS
- Introduction to SAP Security
- Why we need security
- What needs to be protected
- From Whom we need to protect
- Implementation Methodology
- User Administration
- Single User Administration
- Mass User Administration
- LSMW Script Running
Day-2: Introduction to CUA, User Groups Concept
- Introduction of CUA (Central User Administration)
- CUA Configuration for different landscapes
- Performing User Administration Activities in CUA
- Distributing User/IDoc(s) and troubleshooting issues
- User Groups Concept
- Role Administration and Authorization Concept
- Overview of Authorizations Concept
- Change Management Process
- Creating Custom Authorization Objects
- SAP Role Types
- Working with Profile Generator
- Creating and Modifying Different Roles
- Authorization Group Concept
- Missing Authorization
- Tracing the User for Missing Authorization
- Working with R3 tables, Parameters and Reports
- SAP Security Audit
Day-3: Authorization Concept, BW/BI roles and Modification
- Architecture and Strategies for SAP BI Authorization Concept
- Security Requirement in SAP BI
- Standard Roles and Templates for the Authorization Concept
- Creating BW/BI roles and Modification
- Difference between BW and R3 Security
- Difference between BW and BI Security
- Different Authorization Objects Involved in BW/BI
- Analysis Authorization Concepts and Reporting
- Troubleshooting BW/BI Issues
Day-4: HR Security, Personnel Administration
- HR Security
- Introduction to HR Security
- Personnel Administration and Organizational Management
- HR General and Structural Authorizations
- HR Authorization Objects and Info Types
Day-5: GRC
- Troubleshooting HR Issue
- GRC (Governance, Risk and Compliances)
- Introduction to GRC
- Sarbanes Oxley Rules (SOX)
- Overview of GRC Components
- Overview of Authorizations Concept
- Change Management Process
- Creating Custom Authorization Objects
- SAP Role Types
- Working with Profile Generator
- Creating and Modifying Different Roles
- Authorization Group Concept
- Missing Authorization
- Tracing the User for Missing Authorization
- Working with R3 tables, Parameters and Reports
- SAP Security Audit
- Working with Functions, Risk and Mitigation Controls
What is included
- 40-hours of Instructor-led Training
- Study Material
- System Access for hands-on practice
- Video recording on request
- Interview Preparation
About the Instructor
Ms Varsha Vilankar has a Masters Degree in Computers. Varsha has participated in SAP right from the onset of her career in I.T. in 1992.
She has worked on several SAP implementation projects and area of expertise lies in manufacturing and utility industry. Although she is a renowned Technical consultant, nowadays she spends more time managing the company's diverse needs. more