iBase Training

Official Website

SAP Security online training course content by hands-on professionals

 

SAP R3 Security Course

 

 

SAP Security Administration is the technical function that supports security Administration of an SAP Installation. Common tasks include management of roles, authorizations, user accounts, user groups, activity groups, generation of profiles and security auditing. The security introduction will introduce you to SAP security and some of the primary administration transactions necessary to monitor and maintain SAP security.

 

Delivery type: Instructor-led classroom

 

Prerequisites: Exposure to SAP Basis

 

Goals: Familiarize students with security Administrative Transactions and tasks

 

Course based on software release: SAP ECC 6.0 / NetWeaver Application Server 7.0

 

Course Topics:

 

  1. Introduction about security
  2. Default user id’s clients,
  3. Creating users,
  4. Overview of SAP Security (Roles and profiles)
  5. Authorization concepts, transactions, auth objects
  6. Introduction to profile generator
  7. Introduction to composite and derived roles. (briefly mention ORG values)
  8. Practical exercise building roles. Composite and derived.
  9. Adding missing auth objects
  10. Start review of useful tables for security
  11. Review composite and derived roles
  12. System trace and Su53
  13. Inactivating auth objects
  14. Practical Exercise running traces
  15. Creating and assigning users to roles
  16. Use of PFCG_TIME_DEPENDANCY
  17. Use of user groups in security(SUGR)
  18. Useful transactions for security – Introduction
  19. How are default values maintained
  20. Practical exercise building roles. Composite and derived
  21. How to make an auth object an org level variable
  22. How SU25, SU24 and PFCG are linked
  23. Use of SE16 and S_TABU_DIS
  24. Use of SM30
  25. Continue review of useful tables for security
  26. Use of compare (remote compare if allowed)
  27. Why SU53 may not give the correct information
  28. Use of SUIM reports
  29. Use of compare
  30. Use of SAP_ALL and SAP_NEW
  31. How to delete activity groups/roles
  32. How to transport activity groups/roles
  33. Use of SAP* and DDIC
  34. Cal transactions and their importance
  35. SAP security resume preparation
  36. Job placement discussion

 

 

 

 

 

SAP HR Security course (HR 940)

 

This course is based on SAP academy course, we follow HR 940 syllabus and will provide you the HR 940 material as well.

 

 

 

SAP HR Security course (EP 200)

 

This course is based on SAP academy course, we follow EP 200 syllabus related to security and will also provide you the EP 200 material as well.

 

 

 

 

SAP GRC Access control (Version: 5.3)

 

Prerequisite:  SAP R/3 role and user maintenance fundamentals

Unit 1: Overview of GRC access control

  • Understanding GRC applications, requirements and benefits
  • Understanding GRC landscape
  • Release roadmap and compatibility

 

Unit 2: Project planning and stakeholders

Unit 3: Pre-implementation and considerations

Unit 4: Understanding RFC, JCo and background job requirements

 

Unit 5: Risk analysis and Remediation (RAR)

  • Understanding RAR functionality
  • Pre- and post- installation check lists
  • Understanding segregation of duties (SOD)
  • Understanding RAR data requirements
  • Conducting risks and rules workshop
  • RAR rule building exercise
  • Understanding Remediation and mitigation strategy
  • Configuring RAR
  • Troubleshooting RAR

 

Unit 6: Super User Privilege Management (SPM)

  • Understanding SPM functionality
  • Pre- and post- installation check lists
  • Understanding SPM data requirements
  • Understanding Fire Fighter strategy
  • Understanding SAP role, Fire fighter ID and end user ID mapping
  • Configuring SPM
  • Troubleshooting SPM

 

Unit 7: Complaint user provisioning

  • User provisioning process workflow: Role request
  • Advanced workflows
  • Master data and process logic
  • Reporting
  • Workflow engine
  • Compliance exercise and summary
  • Pre- and post- installation check lists
  • Conclusion

 

Unit 8: Enterprise role management

  • Implementation Methodology in ERM
  • Role Generation using ERM
  • Integration with CUP and RAR

Proposals in PFCG and GRC

 

 

Student Registration

Name

Email Id

Country Code

Mobile No

Course Name

City