SAP Securities online training

Course Content

1              SAP

1.1          Overview on ERP

1.2          Different ERPs

1.3          Benefits of SAP

2              PROJECT IMPLEMENTATION      

2.1          Overview on Project Implementation

2.2          Responsibilities as a Consultant

3              SAP BASIS

3.1          SAP Architecture

3.2          Modules in SAP

3.3          Versions

3.4          Hardware Requirements

3.5          SAP Landscape

3.6          SAP Layers

3.7          SAP Installation Procedure

3.8          Implementation Strategy

4              FI INFORMATION            

4.1          Business Structure in SAP

4.2          Structuring the Transactions codes with its Roles in FI & CFM, Modules

4.3          Associating structures to different entities in a company

5              SAP SECURITY  

5.1          INTRODUCTION

5.1.1      Requirement of Security

5.1.2      Protection

5.1.3      Implementation Methodology

5.2          USER ADMINISTRATION

5.2.1      Single User Administration

5.2.2      Mass User Administration

5.2.3      LSMW Script Running

5.3          CENTRAL USER ADMINISTRATION

5.3.1      Introduction

5.3.2      Configuration

5.3.3      User Administration Activities in CUA

5.3.4      Distributing User/ IDOCS and Troubleshooting Issues

5.4          USER GROUP CONCEPT

5.5          ROLE ADMINISTRATION & AUTHORIZATIONS CONCEPT

5.5.1      Overview of Authorizations & Roles

5.5.2      Change Management Process

5.5.3      Creating custom authorization objects

5.5.4      SAP Role Types

5.5.5      Working with Profile Generator

5.5.6      Creating & Modifying different roles

5.6          AUTHORIZATION GROUP CONCEPTS

5.7          MISSING AUTHORIZATION                         

5.8          TRACING USER FROM MISSING AUTHORIZATION                            

5.9          WORKING WITH R/3 TABLES, PARAMETERS, & REPORTS                              

5.10        SAP SECURITY AUDIT                    

5.11        BW/ BI SECURITY            

5.11.1    Architecture & Strategies for a BI Authorization Concept

5.11.2    Security requirements in SAP BI

5.11.3    Standard roles and templates for the authorization concept

5.11.4    Creating BW/BI roles and modification

5.11.5    Difference between BW and R/3 security

5.11.6    Difference between BW and BI Security

5.11.7    Different authorization objects involved in BW/BI

5.11.8    Analysis authorization concept and reporting

5.11.9    Troubleshooting BW/BI issues

5.12        HR SECURITY

5.12.1    Introduction to HR security

5.12.2    Personal administration and Organizational management

5.12.3    HR General and Structural authorizations

5.12.4    HR authorization objects and info types

5.12.5    Troubleshooting HR issues

6              SARBOX, SOD & GRC

6.1          Introduction to SARBOX/ SOX

6.2          Purpose & Introduction of SoD

6.3          SoD Administration

6.4          SoD Matrix

6.5          Risks & Its Mitigation

6.6          Introduction to GRC

6.7          GRC Advantages

6.8          GRC Components

Share on FacebookShare on LinkedInTweet about this on TwitterGoogle+