SAP Audit

SAP Audit focusing on compliance and security in sap for beginners. by Jay Dhruv
3.5 (7 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
517 students enrolled
$25
Take This Course
  • Lectures 66
  • Contents Video: 7.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 9/2013 English

Course Description

SAP Governance and security is an advanced security+governance course which covers various technology areas starting from security, audit, internal controls, sox and risk management. Governance and security go hand in hand. Governance of SAP security with SAP compliance processes and best practices in today a primary focus area.

What are the requirements?

  • None

What am I going to get from this course?

  • Help you land a job in SAP

What is the target audience?

  • Everyone

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: SAP Security
02:39

SAP Audit skills and benefits of SAP Training.

06:29

Introduction to SAP. what is SAP

15:09

SAP Basic logon information

04:52

Why SAP security is needed ? objectives and requirements for SAP security

08:47

What is SAP landscape ? What is SAP client ? definition and demo in detail.

06:35

Let us understand the DNA of SAP security.

02:16

Let us continue to understand the inner workings of SAP security.

26:48

what are the key transactions in SAP ?

26:24

which are the critical tables related to SAP security ?

07:28

SAP security - how to add a custom transaction

13:30

How SU24 works ?

05:32

Let us look into SAP user types

10:27

How to create a single user account in SAP ?

06:51

How to create multiple user accounts in SAP ?

01:52

Understand the principle of SAP CUA.

11:07

understanding the architecture of derived role.

11:58

how to create composite roles ?

14:31

How are password parameters configured in SAP ?

05:18

security audit support requirements are reviewed in this section

09:33

How SUIM reporting works ?

09:40

what are the various steps involved in SAP upgrade security ?

04:21

what are the entities involved in SAP ?

07:41

what are critical actions and permissions ?

03:35

what is the role of approvers in security ?

10:53

How and user and system trace configured ?

09:09

what are SAP baselines ? what are the various steps involved ?

02:26

final conclusion of first half and next steps

Section 2: Governance, Risk and Compliance
06:16

Basics of SAP. a brief history.

07:09

what are the sub processes in SAP. review the top 10.

15:09

basic logon information and gui details

08:47

Understanding the architecture

03:26

what is SAP GRC ? let us look at its inner components.

05:04

what are the versions in SAP ?

09:11

what is risk in IT ?

04:08

what is segregation of duties ?

06:24

How to manage risks ?

03:21

Basics of SAP security

04:00

How is risk constituted ?

03:04

SAP GRC audit addressed

04:13

Basics of GRC RAR

03:46

Introduction to Access enforcer

03:11

Introduction to role expert

Audit expectations
09:07
09:07

How does the GRC tool align to the audit requirements ?

06:35

Authorization objects identified

07:01

Looking at the actual GRC RAR demonstration

05:12

How is risk analysis conducted ?

04:34

Lets take a closer look at simulation.

06:07

what parameters will you select for risk analysis

06:40

GRC mitigations - managing the risk.

Grc rule analysis
07:02
05:09

RAR rules

GRC RAR rules containing conflicting transactions
02:48
GRC RAR critical transactions maintain
05:16
04:15
GRC RAR - critical roles and profiles setup
RAR - reporting views
03:47
SAP GRC RAR rule matrix
05:08
SAP GRC SPM introduction
04:49
SAP GRC SPM entities involved
06:04
SAP SPM demo
03:42
SAP GRC BRM introduction
02:50
BRM overview
03:53
BRM - views
08:47
GRC Access manager
05:31
CUP - compliant user provisioning
03:14
GRC 10 highlights
02:26

what should be your next steps ?

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

SAP Training Now & OJAYO SAP education university, OJAYO SAP Training Now, SAP Consulting, SAP services

SAP Training by OJAYO, benefits

  • 9000+ Happy Customers
  • Fortune company clients: GM, Motorola, Eli Lilly, American standard, BK, Thomascook, L&T, TCS & many more.
  • Certifications: Instructors are certified in SAP, CISA, PMP, MCSE, Oracle, Linux, Sun Solaris, Networking to name a few.
  • Experienced Tutors with 2 decades of Technology hands on experience
  • Practical instructions not mere theory fluff.
  • OJAYO.com vision is "Let’s make you Awesomein SAP"
  • We have always been Passionate about SAP & enterprise technology and want to share that drive with you.
  • Lucid Simple language instructions without all the extra noise.
  • Driven by customer's happiness of gaining knowledge
  • Driven by desire to serve. We strongly believe - Any skill knowledge you gain will stay & serve you for lifetime.
  • Largest range of premium course offerings for SAP. Click me to check out the goldmine.

by Jay Dhruv

Ready to start learning?
Take This Course