SAP Security Training for all
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Get your first job interview for SAP.
" Get a recession proof skill at 1/10th the cost of training "
A career which can easily help you learn valuable skill.
There is no other module which is as central to SAP implementations and support as SAP Security. with SAP security skills, you get exposure to all elements of business as each function involves SAP security configuration.
It is also easy to learn and forms a good entry module for beginners. Excel in SAP security.
The author will teach you with live videos and other aids all the basic skills needed to be an SAP Security administrator in an organization. In no time will you have a good insight into all SAP routine administration tasks.
The course is intended to be lucid, easy to follow not theoretical as are most of the courses taught online.
crack sap interviews successfully and get a 6 figure job.
Get a career break in SAP.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction to SAP|
|What is SAP. a brief history about SAP products and the company.|
|How to logon to SAP system using SAP gui. This session contains basic navigation walkthrough.|
|The significance of SAP security and what value it brings in IT blueprint of the enterprise.|
|what is an SAP landscape. what is a client.|
|Section 2: DNA of SAP Security|
|The basic nuts and bolts of SAP security in parts.|
|How does authorizations translate from a role to a user.|
|A walk through of some important transactions in security and basis area.|
|key tables for security. how to browse a table.|
|How to add a custom auth. object and an object class using transaction SU21.|
|The power of SU24 in SAP security. How SU24 works. and how does it impact role build.|
|Section 3: SAP User management|
|Various types of user accounts used in SAP|
|How to create an single user account in SAP using SU01.|
|How to create multiple user accounts in SAP using SU10 mass user management.|
|Central user administration concept briefly explained.|
|Section 4: Role administration|
|Types of roles and how derived roles work in an organization|
|How do composite roles work.|
|Section 5: SAP Password policy management|
|How password policy can be implemented using server profile parameters in SAP.|
|Section 6: Supporting Internal and external audits|
|4 liason tasks for a security administrator for audit team.|
The power of SUIM reporting
|Section 7: SAP Upgrade security|
|SU25 dissected and deciphered in this section|
|Section 8: SAP Governance, risk & compliance primer|
|The enterprise entity that a security admin will interact with.|
|Actions and permission concept as used in SAP Security grc language.|
|Why SAP role approvers are important from governance point of view. what is the best practice for maintaining the matrix system wise|
|Section 9: Troubleshooting SAP security issues in a structured approach|
|SAP problem troubleshooting with user trace.|
|Section 10: SAP Security baseline process|
|What is the role compliance / reconcilliation / baseline process|
|Section 11: Conclusion|
SAP Training by OJAYO, benefits
by Jay Dhruv