This document provides an overview and contact information for SAP Security Online Training provided by AcuteSoft. The training covers topics such as SAP security concepts, user administration, authorization profiles, roles, transporting roles, audit requirements and more. It also includes overviews of security in SAP modules like HR, BI and GRC. Contact details are provided for AcuteSoft in India, USA and UK.
1. SAP Security Online Training
AcuteSoft:
India: +91-9848346149, +91-7702226149
Land Line: +91 (0)40 - 42627705
USA: +1 973-619-0109, +1 312-235-6527
UK : +44 207-993-2319
skype : acutesoft
email : info@acutesoft.com
www.acutesoft.com
http://training.acutesoft.com
2. SAP Security Online Training
Overview Of The Grcintroduction To ERP
Security Introduction
SAP Project Lifecycle
Default User-id's And Clients
User Types
Creating User-id's
Overview Of SAP Security (Roles And Profiles)
Authorization Concepts, Transactions, Authorization Objects
Introduction To Profile Generator
Introduction To Composite And Derived Roles
Practical Exercise Building Roles, Composite And Derived
Adding Missing Authorisation Objects
System Trace And SU53
Inactivating Authorisation Objects
Creating And Assigning Users To Roles
3. SAP Security Online Training
Use Of PFCG_TIME_DEPENDENCY
Use Of User Groups In Security
How SU25,SU24 And PFCG Are Linked
Use Of Se16 And S_TABU_DIS
Use Of SM30 And SM31
Continue Review Of Useful Tables For Security
Use Of Compare
Use Of SUIM Reports
System Security Settings SCC4,SCC1,SE03,SE06
Use Of Se11,se54,and Security Table Groups
Use Of SUPC
Audit Requirements
USMM Report
License_admin Tool
User Classification
4. SAP Security Online Training
Transporting Roles
Use Of SAP_ALLAnd SAP_NEW
How To Delete Roles
Use Of SAP* And DDIC
USR*,AGR*,USH* Tables
Evaluation Reports RSUSR002,RSUSR040,RSUSR003
Overview Of The SAP-HR SECURITY
Overview Of SAP-HR Security
Pre-requisites To Implement HR Security
Indirect Assignment Of Standard HR Roles To Organizational Objects
Creating Structural Profiles And Assigning To Users
Executing Report In SA38 For Comparing Users In Structural
Profiles Overview SAP-BI SECURITY
Overview Of Analysis Authorisations
5. SAP Security Online Training
Difference Between OLTP And OLAP
Overview Of Info Objects, Info Cubes And Hierarchies
Administrative Workbench Authorisations
Report Level Authorisations At Infoobject,infocube And Info Provider Level
Overview Of The GRC
Overview Of SOX
Overview Of SOD
Introduction To GRC AC 5.3
Introduction Of Different Components In GRC AC
Risk Analysis Remediation Process In GRC AC
Compliant User Provisioning (CUP)
Enterprise Role Management (ERM)
Super User Privilege Management(spm)
Background Jobs For GRC 5.3