SAP Security Training for all

An practical guide to learning SAP security. by Jay Dhruv
8 reviews
TAUGHT BY
  • SAP Training Now & OJAYO SAP education university OJAYO SAP Training Now, SAP Consulting, SAP services

    SAP Training by OJAYO, benefits

    • 9000+ Happy Customers
    • Fortune company clients: GM, Motorola, Eli Lilly, American standard, BK, Thomascook, L&T, TCS & many more.
    • Certifications: Instructors are certified in SAP, CISA, PMP, MCSE, Oracle, Linux, Sun Solaris, Networking to name a few.
    • Experienced Tutors with 2 decades of Technology hands on experience
    • Practical instructions not mere theory fluff.
    • OJAYO.com vision is "Let’s make you Awesomein SAP"
    • We have always been Passionate about SAP & enterprise technology and want to share that drive with you.
    • Lucid Simple language instructions without all the extra noise.
    • Driven by customer's happiness of gaining knowledge
    • Driven by desire to serve. We strongly believe - Any skill knowledge you gain will stay & serve you for lifetime.
    • Largest range of premium course offerings for SAP. Click me to check out the goldmine.

    by Jay Dhruv

WHAT'S INSIDE
  • Lifetime access to 27 lectures
  • 4+ hours of high quality content
  • A community of 1300+ students learning together!
SHARE

SAP Security Training for all

An practical guide to learning SAP security. by Jay Dhruv
8 reviews

HOW UDEMY WORKS?

Discover courses made by experts from around the world.

Take your courses with you and learn anytime, anywhere.

Learn and practice real-world skills and achieve your goals.

COURSE DESCRIPTION

A Certificate of Completion is presented to all students who undertake this course.

Get your first job interview for SAP.

" Get a recession proof skill at 1/10th the cost of training "

A career which can easily help you learn valuable skill.

There is no other module which is as central to SAP implementations and support as SAP Security. with SAP security skills, you get exposure to all elements of business as each function involves SAP security configuration.

It is also easy to learn and forms a good entry module for beginners. Excel in SAP security.

The author will teach you with live videos and other aids all the basic skills needed to be an SAP Security administrator in an organization. In no time will you have a good insight into all SAP routine administration tasks.

The course is intended to be lucid, easy to follow not theoretical as are most of the courses taught online.

crack sap interviews successfully and get a 6 figure job.

Get a career break in SAP.

    • None
    • Over 27 lectures and 4 hours of content!
    • Get your first job in SAP
    • Gain a recession proof skill & earn six figure salary
    • Gain understanding of an ERP system from security perspective
    • Enjoyable & creative content for security
    • Beginners
    • SAP team members looking to add another skill
    • SAP project managers
    • IT lead and managers
    • Audit team members
    • Basis consultants

THE UDEMY GUARANTEE

30 day money back guarantee
Lifetime access
Available on Desktop, iOs and Android
Certificate of completion

CURRICULUM

  • SECTION 1:
    Introduction to SAP
  • 1
    Introduction to SAP
    06:29
    What is SAP. a brief history about SAP products and the company.
  • 2
    Logon and Navigation
    15:09
    How to logon to SAP system using SAP gui. This session contains basic navigation walkthrough.
  • 3
    The need for SAP Security
    04:52
    The significance of SAP security and what value it brings in IT blueprint of the enterprise.
  • 4
    SAP Landscape and concept of client
    08:47
    what is an SAP landscape. what is a client. 
  • SECTION 2:
    DNA of SAP Security
  • 5
    SAP Security DNA 1
    06:35
    The basic nuts and bolts of SAP security in parts.
  • 6
    SAP Security DNA - 2
    02:16
    How does authorizations translate from a role to a user.
  • 7
    Key transactions
    26:48
    A walk through of some important transactions in security and basis area.
  • 8
    Key tables in Security
    26:24
    key tables for security. how to browse a table. 
  • 9
    Custom auth object class and object with SU21
    07:28
    How to add a custom auth. object and an object class using transaction SU21.
  • 10
    SU24
    13:30
    The power of SU24 in SAP security. How SU24 works. and how does it impact role build.
  • SECTION 3:
    SAP User management
  • 11
    SAP User types
    05:32
    Various types of user accounts used in SAP
  • 12
    Single user administration
    10:27
    How to create an single user account in SAP using SU01.
  • 13
    Mass user management with SU10
    06:51
    How to create multiple user accounts in SAP using SU10 mass user management.
  • 14
    What is CUA
    01:52
    Central user administration concept briefly explained.
  • SECTION 4:
    Role administration
  • 15
    Derived roles
    11:07
    Types of roles and how derived roles work in an organization
  • 16
    Composite role
    11:58
    How do composite roles work.
  • SECTION 5:
    SAP Password policy management
  • 17
    Password control with policy RZ10
    14:31
    How password policy can be implemented using server profile parameters in SAP.
  • SECTION 6:
    Supporting Internal and external audits
  • 18
    SAP Audit support
    05:18
    4 liason tasks for a security administrator for audit team.
  • 19
    The power of SUIM reporting
    09:33
  • SECTION 7:
    SAP Upgrade security
  • 20
    Upgrade security
    09:40
    SU25 dissected and deciphered in this section
  • SECTION 8:
    SAP Governance, risk & compliance primer
  • 21
    Entities in SAP Security
    04:21
    The enterprise entity that a security admin will interact with.
  • 22
    Critical action - permissions
    07:41
    Actions and permission concept as  used in SAP Security grc language.
  • 23
    Role approvers
    03:35
    Why SAP role approvers are important from governance point of view. what is the best practice for maintaining the matrix system wise
  • SECTION 9:
    Troubleshooting SAP security issues in a structured approach
  • 24
    User trace
    10:53
    SAP problem troubleshooting with user trace.
  • SECTION 10:
    SAP Security baseline process
  • 25
    SAP Baselines process
    09:09
    What is the role compliance / reconcilliation / baseline process
  • SECTION 11:
    Conclusion
  • 26
    Next steps
    02:26
  • 27
    Download resources
    9 slides

UDEMY BY THE NUMBERS

5,200,000
Hours of video content
19,000,000
Course Enrollments
5,800,000
Students

RATING

  • 5
  • 2
  • 1
  • 0
  • 0
AVERAGE RATING
NUMBER OF RATINGS
8

REVIEWS

  • Hal Cockerham
    OK, but needs "professional" improvement and more detail

    There was certainly some good information in this training, however much of it seemed disorganized, unrehearsed and lacked detail. I would describe the course as a good overview for a complete novice to SAP Security, but not much "news" in this course for anyone with much experience working in this area.

  • Harshad Sonar
    Very well presented

    This is about a 4-hour course that introduces one to SAP Security. I hope there is will be an advanced version of the course too.

  • Vanessa
    Good course indeed

    Jay covers a very good subject in easy to follow method. This is excellent value for money as I have tried with other training providers before OjayO. His slides are creative and topics are engaging. I was happy to have this great deal.

  • Sophia
    I like it....

    I enjoyed the simple instructions and lucid approach of the author. He has covered a wide variety of topics. The slides and images are beautiful... I would definitely take another course with him.

  • 30 day money back guarantee!
  • Lifetime Access. No Limits!
  • Mobile Accessibility
  • Certificate of Completion
STUDENTS WHO VIEWED THIS COURSE ALSO VIEWED:
MORE FROM SAP Training Now & OJAYO SAP education university