First time here? Take a quick tour of our comprehensive Online Training.
» Take Tour

See what people have been saying about us.
» Feedback

SECURITIES WITH GRC
► Overview of the GRC
  • Introduction to ERP
  • Security Introduction
  • SAP Project Lifecycle
  • Default user-id's and clients
  • User types
  • Creating user-id's
  • Overview of SAP Security (Roles and Profiles)
  • Authorization concepts, transactions, authorization objects
  • Introduction to Profile Generator
  • Introduction to Composite and derived roles
  • Practical exercise building roles, composite and derived
  • Adding Missing Authorisation Objects
  • System Trace and SU53
  • Inactivating Authorisation objects
  • Creating and assigning users to roles
  • use of PFCG_TIME_DEPENDENCY
  • use of User Groups in Security
  • How SU25,SU24 and PFCG are linked
  • Use of se16 and S_TABU_DIS
  • Use of SM30 and SM31
  • Continue review of Useful tables for security
  • Use of Compare
  • Use of SUIM reports
  • System security settings SCC4,SCC1,SE03,SE06
  • Use of SE11,SE54,and security table groups
  • use of SUPC
  • Audit requirements
  • USMM Report
  • License_admin tool
  • User classification
  • Transporting roles
  • Use of SAP_ALL and SAP_NEW
  • How to delete Roles
  • Use of SAP* and DDIC
  • USR*,AGR*,USH* Tables
  • Evaluation Reports RSUSR002,RSUSR040,RSUSR003
► Overview of the SAP-HR SECURITY
  • Overview of SAP-HR Security
  • Pre-requisites to implement HR Security
  • Indirect assignment of standard HR Roles to Organizational Objects
  • Creating structural profiles and assigning to users
  • Executing report in SA38 for comparing users in structural
► Profiles Overview SAP-BI SECURITY
  • Overview of Analysis Authorisations
  • Difference between OLTP and OLAP
  • Overview of info objects, info cubes and hierarchies
  • Administrative workbench Authorisations
  • Report level Authorisations at infoobject,infocube and Info provider level
► Overview of the GRC
  • Overview of SOX
  • Overview of SOD
  • Introduction to GRC AC 5.3
  • Introduction of different components in GRC AC
  • Risk Analysis Remediation process in GRC AC
  • Compliant User Provisioning (CUP)
  • Enterprise Role Management (ERM)
  • Super User Privilege Management(SPM)
  • Background Jobs for GRC 5.3 

Testimonials

Thank you for having this. I would not have had an extended education if there was not online learning..Rama Krishna
My online course was terrific! You really do get to know the other students. I talked to more people because it was a smaller class. There was a great sense of community.........Ravinder Reddy
Superb..........Subhash
...10 out of 10 stars.....Dipu Padey
...the best out there.....Santosh.M
I found online learning more convenient then the traditional classroom because I work full-time and getting to classroom across town in traffic is problematic.......Divya
...a very effective way to learn.....Rajesh
Have a testimonial about a ACEONLINEMENTORS services? If so, send us an e-mail at feedback@aceonlinementors.com with your testimonial and how you benefited from our training.......
more testimonials..