SAP Security Training
4.0 (376 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,415 students enrolled

SAP Security Training

A Practical and Detail Learning Program on SAP Security & Authorizations
4.0 (376 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,415 students enrolled
Created by Dev S
Last updated 5/2020
English
English [Auto]
Current price: $56.99 Original price: $94.99 Discount: 40% off
13 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 7.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand the Core Concepts of SAP Security
  • Learn several tips and tricks to work smartly as a SAP Security consultant
  • Students will feel confident enough about SAP Authorization Concepts
Requirements
  • It would be good if a student knows about what is a computer and what is software? That's it.
  • And your interest to learn SAP Security
Description

"SAP Security & Authorizations" is a course specially designed for students who are willing to take Quality training into SAP Security and Authorizations. As I don't believe in the slide show, I have made this course a practical one demonstrating the subject on live system. The course also discusses possible interview questions that you might face for that particular topic and also it unfolds some unknown technical secret tips and tricks about SAP Security which will help you to work smartly.

This course not only describes the subject in detail but also explains the topics technically and theoretically in detail with real-time examples thus making it easy for you to understand them soon. 

As a gist, I would say this is the best course to start with if you want to learn "SAP Security".


Feedbacks from several students :

Tony Kujo: ⭐⭐⭐⭐⭐

Brilliant (Very Impressive) The lecture videos where on point. Each and very video was well layered out. They are very concise and straight to the point. I recommend this lecture in SAP Security and GRC to all beginners. In one word, I will say FANTASTIC.


Rajesh Singh: ⭐⭐⭐⭐⭐

Thank you so much for creating this SAP Security Course...Very interesting and very details explaining all the concepts. System demonstration was very nice and helps to correlate with the actual scenario. Thank you for your course.. Looking forward for your support in resolving the doubts if any relating to SAP Security.


Anees Garder: ⭐⭐⭐⭐⭐

Nice!!! I have a very good understanding and this course meets my expectation.


Shreya Gulati: ⭐⭐⭐⭐⭐

Well structured course covering the basic ECC Security concepts with shown with live server. Recommended for a SAP Security Consultant looking to brush up their skills.


Suhas Raut: ⭐⭐⭐⭐⭐

It was a nice learning experience , Thank you!


Pallavi Purohit: ⭐⭐⭐⭐⭐

Course content was good. And I was able to clearly understand the speaker. Great Job!


Sherlyn Dicon: ⭐⭐⭐⭐⭐

Good Learning


Jamiu Bakare: ⭐⭐⭐⭐⭐

Great presentations. Instructor is very knowledgeable on SAP GRC/Security


Amit Kalpish: ⭐⭐⭐⭐⭐

its awsome. I really learnt a lot. Teaching method id very user friendly. It's a very good learning experience.

Who this course is for:
  • Students who are preparing themselves for SAP Security and Authorizations Projects
  • Students who are willing to learn SAP Security and Authorizations from very begining
  • Students who want to understand SAP Security in depth
  • And i welcome everyone for this course
Course content
Expand all 34 lectures 07:40:53
+ Introducing SAP
3 lectures 15:37

This is an introductory video informing the sections covered in this course

Preview 03:19

This video explains about "What is SAP" and "What is SAP ERP"?

Preview 09:16

This videos has explanation about what actually SAP Security and Authroization is ?

Understanding SAP Security
03:02

This quiz tests your understanding about SAP and SAP Security.

SAP Security Quiz
4 questions
+ User Administration
9 lectures 01:20:48

In this video you will learn about types of users allowed to be created in SAP system

User Types in SAP
07:16

This video discuss about the possible technical methods in SAP using which you can create a user account in SAP system.

Creating User in SAP
05:15

It shows the mandatory fields that you must fill out while creating a user account in SAP. Without filling these fields you would not be able to create user account.

SAP User Account - Mandatory Fields to Maintain
03:06

This video shows how can you create user accounts in SAP using t-code SU10. This video also unfolds the pros and cons of using SU10 for creating users.

User Creation Using T-Code SU10?
12:08

Yes you can rename a user is SAP system. Learn from this video how can you do so. This option has been made obsolete in SAP now but its good to learn it.

Renaming User in SAP
03:30

There are two tabs in user account where you maintain user group. First is Logon Data tab and other is Groups tab. This video explains and demonstrate the difference clearly and deeply with examples.

User Group in Logon Tab and Groups Tab - 1
05:39

There are two tabs in user account where you maintain user group. First is Logon Data tab and other is Groups tab. This video explains and demonstrate the difference clearly and deeply with examples.

User Group in Logon Tab and Groups Tab - 2
16:26

This lecture discuss about different SAP tables holding data about a user. These tables are of high use for any SAP Security consultant

Important SAP Tables - User Account Details
14:47

This video shows you the traditional method to pull out the e-mail address of multiple users form their SU01 account. This video also shows how can you use SQVI and combine tables to pull e-mail address of multiple users without any hassle and excel usage.

Preview 12:41

This quiz tests your knowledge about user administration concepts. 

User Administration Quiz
4 questions
+ Authorization Concept in SAP
3 lectures 53:17

This lecture explains the key elements and building blocks of SAP Authorization concept.

Understanding SAP Authorization Concept Part 1
20:06

This lecture explains the key elements and building blocks of SAP Authorization concept

Understanding SAP Authorization Concept Part 2
21:26

SAP Security - Understanding SAP Autihorization Concept

Understanding SAP Authorization Concept Part 3
11:45
+ Role Administration
10 lectures 03:39:16

This video explains about check indicator t-code(SU24) and about SU22 as well. This lecture also gives you information about the consequences of changing proposal and check indicator value. All explanation on live system.

SU22 and SU24 - Understanding Concept
22:47

This lecture explains you more about SU22 and SU24. It also demonstrates both these transaction codes in live system. There is a discussion about tables behind these two t-codes as well in this lecture.

SU22 and SU24 - Inside Live System
34:29

This lecture explains you what is meant by role in SAP.

SAP Security Role
16:23

In this lecture, role creation process has been explained

SAP Role Creation
37:08

This lecture discuss about Single and Composite role concept. It also explains advantages and disadvantages of them.

Single and Composite Role
18:36

This lecture explain the technical and theoretical reason on"Why a composite role cannot be added to another composite role". This lecture demonstrates the technical reason on live SAP system. You get to see and understand the concept in detail with examples. 

Adding A Composite Role To Another Composite Role
11:08

This lecture explains the concept of Master and Derived role. This lecture also discuss about their advantages

Master and Derived Roles
25:14

Task and enabler role is not SAP standard approach but it is from a different company. This lecture explains this new approach of role design.

Task and Value Roles
21:14

This lecture explains the significance of different maintenance status you see for an authorization object in role

Authorization Object Maintenance Status in Role
19:16
Creating a Custom Authorization Class, Object and Field
13:01
+ User Information System
3 lectures 16:49

This video gives you an introduction to User Information system - SUIM

Introduction to User Information System
04:43

If you know the first, last name, department, location of a SAP user then you can simply search their full detail in system using SUIM functionality.

User by Address data
06:06

This lecture explains you how to generate report which has user as output list. User has been selected on that basis of address data like user's first and last name or user group.

Users By Complex Selection Criteria
06:00
+ Playing around with Transaction codes
2 lectures 19:28

Several times when it is not possible to control access via authorization objects you need to go for some customization. Here we see how can you create a custom t-code or t-code variant using t-code SHD0.

Creating custom T-Code - SHD0
07:14

This lecture explains a very helpful tool SQVI in SAP. SQVI helps creating queries for pulling out data from different tables combined together.

SAP Query - SQVI
12:14
+ System Administration
4 lectures 55:53

This video explains how can you login into another SAP server from the current server you are logged into. This is required when you have to trace authorization checks for a user currently active in another server.

Login Into Another Instance/Server
03:13

This video explains how can you lock and unlock a t-code in SAP system. This also clarifies that how can you generate list of all locked and unlocked t-codes in SAP system.

Locking/Unlocking of t-code and Get List of All Locked t-codes
07:01

This video explains how to find list of users logged in into partucular SAP instance. You will have option to terminate user session for any user.

Active User Sessions
11:24

Authorization trace is a way used to troubleshoot the missing authorizations for a user. In this lecture we will use t-code ST01 and STAUTHTRACE to troubleshoot authorization issue for a test user. In this lecture difference between both transaction codes has also been discussed. 

Authorization trace - Troubleshooting authorization issues
34:15