sap security training

SAP Security Online Training

R/3 Security Online Training || BI Security Online Training || HR Security Online Training || CRM Security Online Training || SRM Security Online Training || PORTAL Security Online Training

SAP R/3 Security Online Training

  • Overview of SAP
  • Overview of SAP BASIS
  • Introduction to SAP Security
  • Why we need security
  • What needs to be protected
  • From whom we need to protect
  • Implementation methodology
  • User administration
  • Single user administration
  • Mass User administration
  • LSMW Script running
  • Introduction of CUA (Central User administration)
  • CUA Configuration for different landscapes
  • Performing user administration activities in CUA
  • Distributing User/IDOCS and troubleshooting issues
  • User Groups Concept
  • Role Administration and authorizations concept
  • Overview of authorizations and roles
  • Change management process
  • Creating custom authorization objects
  • SAP Role types
  • Working with Profile Generator
  • Creating and modifying different roles
  • Authorization Group Concept
  • Missing authorization
  • Tracing the user for missing authorization.
  • Working with R/3 tables, parameters and Reports
  • SAP Security Audit


BI Security Online Training

  • Difference between BW & BI functionalities
  • Analysis authorizations
  • Difference between BW 3.x & BI7.0
  • TCodes&Tables in BI
  • Securing reporting Users access
  • Authorization trace
  • Creation & assignment of Analysis authorizations
  • Securing access to workbooks
  • Additional BI7 security features


HR Security Online Training

  • Structural authorizations
  • HR Master Data authorizations
  • Authorization main switches
  • Authorization objects for payroll
  • Info types concept
  • Tables in HR


No comments:

Post a Comment