learn sap security | SAP GRC for Dummies| SAP GRC training |

SAP Security and GRC Online Training
SAP Security Online Training
Introduction to SAP Security & GRC Course content
The SAP Authorization Concept
SAP Authorization Hierarchy
All About SAP Authorizations & profiles
About Authorization Checks
User Administration
New User Setup
Managing single & mass Users
Password Management
Locking or Unlocking a User
Managing User Groups
User Administration tasksRole Administration
All about Profile Generator
Copying and Modifying SAP-Provided User Role Templates
Advanced Profile Generator Functionality
Managing Single Roles
Managing Composite & Derive Roles
Role Transportation
Troubleshooting/Anaysis/InvestigateSecurity issues
User Information System & the usage
Finding missing Authorizations & Analysis
Authorization Trace & Analysis
Managing Authorization Checks Using SU24
About Security Tables/Critical Areas
Security Policies and Procedures
Overview of Auditing
Security tables
Security Consultant Roles and Responsibilities
All About GRC
FAQs
What is SOX and SOD
 
SAP GRC Online Training
GRC ACCESS CONTROL 5.3
overview of GRC Components functionality
All About Risks,SOD,Mitigation,Remediation & Analysis
Post Installation & GRC Component Deployment
SLD/JCO connection Settings
Configuration of GRC Components
Risk Analysis and Remediation (RAR)
Compliant User Provisioning (CUP)
Enterprise role Management (ERM)
Super user Privilege Management (SPM)
Configuration with Back-End SAP Systems
SAP R/3 4.7(or)
SAP R/3 6.0 ECC
Customizing GRC components to the industry requirements
Configuration of Workflows
Risk configuration
Configure Rule set
Configure Functions
SAP GRC 10 training