SAP Security Training

A practical and detail training program on SAP Security & Authorizations
3.7 (22 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
87 students enrolled
50% off
Take This Course
  • Lectures 24
  • Length 4 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2016 English

Course Description

"SAP Security & Authorizations" is a course specially designed for students who are willing to take quality training into SAP Security and Authorizations. As i don't believe in slide show, i have made this course a practical one demonstrating the subject on live system. The course also discuss about possible interview questions that you might face for that particular topic and also it unfolds some unknown technical secret tips and tricks about SAP Security which will help you to work smartly.

This course not only describes the subject in detail but also explain you the topics technically and theoretically in detail with real time examples thus making it easy for you to understand them soon. 

As a gist i would say this is best course to start with if you want to learn "SAP Security".

What are the requirements?

  • It would be good if a student knows about what is a computer and what is software? That's it.

What am I going to get from this course?

  • Respond to various SAP Security and Authorizations interview questions
  • Learn several tips and tricks to work smartly as a SAP Security consultant
  • Students will feel confident enough about SAP authorization concepts

Who is the target audience?

  • Students who are preparing themselves for SAP Security and Authorizations interview
  • Students who are willing to learn SAP Security and Authorizations from very begining
  • And i welcome everyone for this course

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Introducing SAP

This is an introductory video informing the sections covered in this course


This video explains about "What is SAP" and "What is SAP ERP"?


This videos has explanation about what actually SAP Security and Authroization is ?

4 questions

This quiz tests your understanding about SAP and SAP Security.

Section 2: User Administration

This video discuss about the possible technical methods in SAP using which you can create a user account in SAP system.


In this video you will learn about types of users allowed to be created in SAP system


It shows the mandatory fields that you must fill out while creating a user account in SAP. Without filling these fields you would not be able to create user account.


This video shows how can you create user accounts in SAP using t-code SU10. This video also unfolds the pros and cons of using SU10 for creating users.


Yes you can rename a user is SAP system. Learn from this video how can you do so.


There are two tabs in user account where you maintain user group. First is Logon Data tab and other is Groups tab. This video explains and demonstrate the difference clearly and deeply with examples.


There are two tabs in user account where you maintain user group. First is Logon Data tab and other is Groups tab. This video explains and demonstrate the difference clearly and deeply with examples.


This lecture discuss about different SAP tables holding data about a user. These tables are of high use for any SAP Security consultant


This video shows you the traditional method to pull out the e-mail address of multiple users form their SU01 account. This video also shows how can you use SQVI and combine tables to pull e-mail address of multiple users without any hassle and excel usage.

4 questions

This quiz tests your knowledge about user administration concepts. 

Section 3: Authorization Concept in SAP

This lecture explains the key elements and building blocks of SAP Authorization concept.


This lecture explains the key elements and building blocks of SAP Authorization concept


SAP Security - Understanding SAP Autihorization Concept Part 1

Section 4: User Information System

This video gives you an introduction to User Information system - SUIM


If you know the first, last name, department, location of a SAP user then you can simply search their full detail in system using SUIM functionality.


This lecture explains you how to generate report which has user as output list. User has been selected on that basis of address data like user's first and last name or user group.

Section 5: Playing around with Transaction codes

Several times when it is not possible to control access via authorization objects you need to go for some customization. Here we see how can you create a custom t-code or t-code variant using t-code SHD0.


This lecture explains a very helpful tool SQVI in SAP. SQVI helps creating queries for pulling out data from different tables combined together.

Section 6: System Administration

This video explains how can you login into another SAP server from the current server you are logged into. This is required when you have to trace authorization checks for a user currently active in another server.


This video explains how can you lock and unlock a t-code in SAP system. This also clarifies that how can you generate list of all locked and unlocked t-codes in SAP system.


This video explains about check indicator t-code(SU24) and about SU22 as well. This lecture also gives you information about the consequences of changing proposal and check indicator value. All explanation on live system.

Section 7: Role Administration

This lecture explain the technical and theoretical reason on"Why a composite role cannot be added to another composite role". This lecture demonstrates the technical reason on live SAP system. You get to see and understand the concept in detail with examples. 

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Gaurav Shrivastava, SAP Security Consultant

Instructor is a SAP Security and GRC consultant with over 8 years of experience into SAP Security and GRC. He has worked on multiple projects on SAP implementation, support and upgrades. He also has good experience in online teaching. He hold master degree in computer application(MCA). He is highly focussed on clearing the concepts and making it easy for his students to understand the topic. He starts from the scratch of the topic and takes it further which makes his course useful for his students.

Ready to start learning?
Take This Course