SAP SECURITY Online Training

  • (25 REVIEWS )

SAP SECURITY is one of the leading ERP in the market and number one in the market with huge margin in the most important aspects in modern business. The one of the foremost responsibility in any business is security of information – Customer Data, Purchase Data, Clinical-trails data in Pharma industry, etc.

Description

SAP SECURITY is the System Administration aspect of the SAP system with functions that have a cross-system impact. To a newbie, SECURITY may be misconstrued to be the intro to a course in SAP but that is totally incorrect. SECURITY is actually the bedrock of SAP i.e. the technical layer of the SAP system without which the SAP system will not be available for use. SECURITY is a group of middleware programs and tools that enable applications to be interoperable and portable across operating systems and database products. It also comprises of a client/server architecture and configuration, a relational database management system (RDMS), and OS administration.

Pre-requisites

We fulfills the objectives of Confidentiality, Integrity, & Availability, the other fulfillments carried by SAP Security training are Complying Legal Requirements – SOX, HIPPA, ITAR. Segregation of Duties vs. Excessive Access, Controls – Preventive Vs Detective, Mitigating conflicts etc. SAP Security Course Deals With The Protection Of The Information From Unauthorized Use

Course Objectives

SAP Security is designed to introduce SAP R/3 architecture, User Administration and SAP authorization objects. This program will help trinees gain indepth knowledge of SAP authorizations, User Master records, Profile generation using PFCG, Tracing and analyzinig SAP authorizaion issues and a brief introduction of CUA

Prepare for Certification!

Our training and certification program gives you a solid understanding of the key topics covered by Foundation and Advanced Level Certification exams. This is aimed at students who have recently completed, and experienced professionals to enhance their practical knowledge in SAP SECURITY modules. In addition to boosting your income potential, getting certified, demonstrates your knowledge and the skills, understanding of the fundamentals of SAP SECURITY along with processes, tools, techniques, and management methodology. The certification validates your ability to produce reliable, high-quality results with increased efficiency and consistency.

How will I perform the practical sessions in Online training?

For online training, US GlobalSoft provides a virtual environment that helps in accessing each other’s system. The complete course material in pdf format, reference materials, course code is provided to trainees. US GlobalSoft conductes online sessions through any of the available requirements like Skype, WebEx, GOTOMeeting, Webinar, etc.

SAP Security Course Syllabus

  1. SAP System Land Scape (DEV,QAS, PRD)
  2. R/3 SECURITY
  3. SAP R/3 User Administration
  4. User Administration (SU01)
  5. User Creation
  6. User modification
  7. User Deletion
  8. User lock/unlock
  9. Password Resetting
  10. Mass User Administration (SU10)
  11. User Groups
  12. Tables Related to User Administration
  13. SAP R/3 Authorization Concept
  14. Role administration using PFCG
  15. Single roles
  16. Composite roles
  17. Derived roles
  18. Role Transport
  19. Authorization objects
  20. Authorization in Role administration
  21. User Buffer / Roles
  22. Missing Authorization (SU53,ST01)
  23. Tables Related to Roles (AGR* Tables)
  24. Maintenance of Authorization objects (SU24)
  25. Troubleshooting (SU53,SU56 and ST01)
  26. Protect Tables and Transaction codes and Programs
  27. User Information System (SUIM)
  28. Security Audit System(SM19,SM20)
  29. Password Profile Parameters
  30. Configuration Of Central User Administration (CUA)
  31. Portal Users and Roles  (UME)

BI SECURITY:

  1. Overview of BI System (BI 7.0)
  2. Reporting Authorization Objects
  3. BI Analysis Authorizations
  4. Troubleshooting

NetWeaver Security

  1. Create users in java engine
  2. Create roles in java engine
  3. Assign the role to users in java engine
  4. Import the profiles in java engine

Certification

Certification assistance provided with proper guidance and certification notes.