SAP Security Online Training – Learn @ your convenience
Why SAP Security Online Training @ GO IT ?
GO IT Soft is a Leading IT Training Solution Provider for the SAP Security Online Training by Qualified & Certified Professionals.
Who Can go with SAP Security Online Training ?
1) Anybody who has technical background 2) Anybody who is currently working in SAP BASIS, Administration background.
What is SAP Security ?
SAP is now most widely used ERP today. So to increase the efficiency of the software the SAP has separated Security module from Basis and enhanced the functions and utilities of SAP Security. As SAP deals with data and applications of the company,the use of this data by unauthorized person may result in big harm.
For example…if a person who is responsible for creation of purchase order is given access to approve purchase order as well, he may create and approve as many purchase order without any use.So SAP Security revolves around protecting the access of a user and restricting it to access the data and applications related to his job profile only.Therefore, protecting the SAP data and applications from unauthorized use and processing is called SAP Security.
Key Features of SAP Security Online Training:
1) 35 hours of Live Training
2) Free 60 days IDES Access
3) Life time access to Course Recordings
4) Complete set of Documents
SAP Security Online Training Course Content:
We have designed a SAP Security Online Training Course Curriculum which is more elaborate and can understand & follow the course by any individual like, Beginners to Consultants…
SAP R/3, Netweaver Technologies SAP Security
Elements of SAP Authorization Concepts
User Master Record
Working with Profile Generator (Roles, Composite Roles, Derived Roles, Customizing Roles)
Access Control and User administration (password Rules, special users, Authorization Administration)
Analysis and monitoring functions.
Special Authorization Components (Express Profile Gen)
Transport of authorization components
Automation of initial Loads
Central User Administration
Configuring and Using Basis Security Audit Tools Configuration of the Audit Log Reading the Audit Log
Controlling Transaction Codes, Tables, Programs
Auditing the protection of transaction code execution
Auditing the protection of direct table access
Auditing the protection of direct program execution Auditing the protection of developer access
Securing User and Group Administration
User Information System for Audits
Decentralized security approaches Trace tools for users that can be used to support audits
Auditing standard SAP users Auditing user related security parameters
Change Management and Security SAP recommended system landscape
Approval processes for change management
Auditing system change options and client change options
Roles and responsibilities for change management
Securing System Administration Services in Production
Auditing security for background processing
Auditing security for spool, operating system commands
System authorizations required for end-users
Auditing RFC destinations
BW Security Review
Enterprise Portals Security Review
HR Security Review
SECATT script for Mass user creation
Background job monitoing
Profile parameters for the security