TRAINING

If you are looking for SAP Security Training, you can reach me at below contact details :

E-mail : sapindia01@gmail.com
Skype : sapindia01


The training will cover the complete SAP R/3 Security, HR Security and BI Security and GRC 5.3 Overview. You can write to me as well for more information at sapindia01@gmail.com


Below are training details

Training Subject : SAP Security
Duration : 45-50 Hrs (Weekdays/Weekend both options are available)
Training Fees : Please send me an e-mail for fees details.
Training Material : Soft copy and training videos will be provided
Training Mode : Online 
Server Access : USD 30 $ Per Month/Per Candidate

This training does not require you to have a technical background. You can attend this training if you are from non technical background as well.

Below is the training syllabus :

SAP SECURITY

 What is Security & Why?
 Security audit & consideration?
 Security layers
 Data layer
 Access security
 Operational security
 Audit Security & Security audit log parameters.
 Application on R/3 Security.
 OS level security & Change management.
 Types of Security
 Internal Security
 External Security
 SAP Security
 User administration & Types of Users.
 Central user administration (CUA).
 Authorizations.
 Authorization Objects.
 Authorization profiles.
 Programming authorizations.
 Table Authorization groups.
 Assigning group to a table.
 Missing authorizations
 Authorization Trace.
 Troubleshooting authorization issues
 Concept of Roles 
 Roles administration
 Composite Role
 Single Role
 Derived Role
 Parent Role & Child Role.
 Merge Authorization concept
 Copying authorizations in a role from a profile.
 Technical background for single and composite role
 Transportation of Roles & Role Mitigation.
 The complete User status (SUIM).
 Locking transactions.
 Remote control over user sessions
 Restricting access to SAP* & DDIC.
 SAP Security tables.
 SAP Security reports for various usage.
 SAP R/3 architecture & Layers.
 Client administration.
 Spool administration Basics.
 Background jobs.
 Monitoring.
 Transport management Basics.
 OSS Message handling.

BI-Security

Architecture and strategies for a BI authorization concept
Security requirements in SAP BI
Standard roles and templates for the authorization concept
Creating BW/BI roles and modification
Difference between BW and R/3 security
Difference between BW and BI Security
Different authorization objects involved in BW/BI
Analysis authorization concept and reporting
Troubleshooting BW/BI issues

HR-SECURITY

Structural authorizations
HR Master Data authorizations
Authorization main switches
Authorization objects for payroll
Info types concept
Tables in HR

GRC 5.3 Overview of components.

1 comment:

  1. This comment has been removed by a blog administrator.

    ReplyDelete