Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add SAP Security Training to your Wishlist.

Add to Wishlist

SAP Security Training

A practical and detail training program on SAP Security & Authorizations
3.7 (20 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
100 students enrolled
Last updated 11/2016
$10 $30 67% off
2 days left at this price!
30-Day Money-Back Guarantee
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Respond to various SAP Security and Authorizations interview questions
Learn several tips and tricks to work smartly as a SAP Security consultant
Students will feel confident enough about SAP authorization concepts
View Curriculum
  • It would be good if a student knows about what is a computer and what is software? That's it.

"SAP Security & Authorizations" is a course specially designed for students who are willing to take quality training into SAP Security and Authorizations. As i don't believe in slide show, i have made this course a practical one demonstrating the subject on live system. The course also discuss about possible interview questions that you might face for that particular topic and also it unfolds some unknown technical secret tips and tricks about SAP Security which will help you to work smartly.

This course not only describes the subject in detail but also explain you the topics technically and theoretically in detail with real time examples thus making it easy for you to understand them soon. 

As a gist i would say this is best course to start with if you want to learn "SAP Security".

Who is the target audience?
  • Students who are preparing themselves for SAP Security and Authorizations interview
  • Students who are willing to learn SAP Security and Authorizations from very begining
  • And i welcome everyone for this course
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 24 Lectures Collapse All 24 Lectures 03:50:08
Introducing SAP
3 Lectures 15:37

This is an introductory video informing the sections covered in this course

Preview 03:19

This video explains about "What is SAP" and "What is SAP ERP"?

Preview 09:16

This videos has explanation about what actually SAP Security and Authroization is ?

SAP Security - What is SAP Security?

This quiz tests your understanding about SAP and SAP Security.

SAP Security
4 questions
User Administration
9 Lectures 01:20:48

This video discuss about the possible technical methods in SAP using which you can create a user account in SAP system.

SAP Security - What all possible ways are there to create a user in SAP system?

In this video you will learn about types of users allowed to be created in SAP system

SAP Security - How many types of users are there in SAP system?

It shows the mandatory fields that you must fill out while creating a user account in SAP. Without filling these fields you would not be able to create user account.

SAP Security - What are mandatory fields in user account?

This video shows how can you create user accounts in SAP using t-code SU10. This video also unfolds the pros and cons of using SU10 for creating users.

SAP Security - How to create users by T-Code SU10?

Yes you can rename a user is SAP system. Learn from this video how can you do so.

SAP Security - How to rename a user in SAP system?

There are two tabs in user account where you maintain user group. First is Logon Data tab and other is Groups tab. This video explains and demonstrate the difference clearly and deeply with examples.

SAP Security - What is user group in Logon tab and Groups tab - 1

There are two tabs in user account where you maintain user group. First is Logon Data tab and other is Groups tab. This video explains and demonstrate the difference clearly and deeply with examples.

SAP Security - What is user group in Logon tab and Groups tab - 2

This lecture discuss about different SAP tables holding data about a user. These tables are of high use for any SAP Security consultant

SAP Security - What are important user data tables?

This video shows you the traditional method to pull out the e-mail address of multiple users form their SU01 account. This video also shows how can you use SQVI and combine tables to pull e-mail address of multiple users without any hassle and excel usage.

Preview 12:41

This quiz tests your knowledge about user administration concepts. 

User Administration Quiz
4 questions
Authorization Concept in SAP
3 Lectures 53:17

This lecture explains the key elements and building blocks of SAP Authorization concept.

SAP Security - Understanding SAP Authorization Concept Part 1

This lecture explains the key elements and building blocks of SAP Authorization concept

SAP Security - Understanding SAP Authorization Concept Part 2

SAP Security - Understanding SAP Autihorization Concept Part 1

SAP Security - Understanding SAP Authorization Concept Part 3
User Information System
3 Lectures 16:49

This video gives you an introduction to User Information system - SUIM

SAP Security - Introduction to User Information System

If you know the first, last name, department, location of a SAP user then you can simply search their full detail in system using SUIM functionality.

SAP Security - User by Address data

This lecture explains you how to generate report which has user as output list. User has been selected on that basis of address data like user's first and last name or user group.

SAP Security - Users by complex selection Criteria
Playing around with Transaction codes
2 Lectures 19:28

Several times when it is not possible to control access via authorization objects you need to go for some customization. Here we see how can you create a custom t-code or t-code variant using t-code SHD0.

SAP Security - How to create custom t-code using SHD0?

This lecture explains a very helpful tool SQVI in SAP. SQVI helps creating queries for pulling out data from different tables combined together.

SAP Security - What is SQVI and how do you use it as a SAP Security Consultant?
System Administration
3 Lectures 33:01

This video explains how can you login into another SAP server from the current server you are logged into. This is required when you have to trace authorization checks for a user currently active in another server.

How to login into another server from the server you are currently logged in?

This video explains how can you lock and unlock a t-code in SAP system. This also clarifies that how can you generate list of all locked and unlocked t-codes in SAP system.

How to lock/unlock a t-code and how to see list of all locked/unlocked t-codes?

This video explains about check indicator t-code(SU24) and about SU22 as well. This lecture also gives you information about the consequences of changing proposal and check indicator value. All explanation on live system.

SAP Security - What is the significance of t-codes SU22 and SU24?
Role Administration
1 Lecture 11:08

This lecture explain the technical and theoretical reason on"Why a composite role cannot be added to another composite role". This lecture demonstrates the technical reason on live SAP system. You get to see and understand the concept in detail with examples. 

SAP Security - Why a Composite Role cannot be added to another Composite Role?
About the Instructor
3.7 Average rating
20 Reviews
100 Students
1 Course
SAP Security Consultant

Instructor is a SAP Security and GRC consultant with over 8 years of experience into SAP Security and GRC. He has worked on multiple projects on SAP implementation, support and upgrades. He also has good experience in online teaching. He hold master degree in computer application(MCA). He is highly focussed on clearing the concepts and making it easy for his students to understand the topic. He starts from the scratch of the topic and takes it further which makes his course useful for his students.

Report Abuse