Skip links
Trustpilot Reviews

Trustpilot Reviews

Rated 4.7/5

SAP Security

SAP Security : Learn Strategies from Experts Behind Over 1000+ Crores in Ads Spend

Trusted by world's biggest organizations

Who is it for?

This course is aimed at Project Managers, Project Team Members and People with organisational responsibilities

The course is also suitable for customers who are still using an SAP R/3 version of the component

Prerequisites

SAPTEC Fundamentals of SAP Web AS

SAP01 SAP Overview

SAP Security

In today’s competitive market, individuals who possess essential business and technological skill enjoy a significant advantage over their peers. This is particularly true if your expertise includes SAP software. The SAP Security program provides that competitive edge. When you are SAP certified, you join a distinguished community of experts recognised globally. Today more than 14,000 consultants and users worldwide are part of this exclusive community.

What you will learn?

  • Introduction
  • Elements of the SAP authorisation concept
  • User master record
  • Using the Profile Generator (roles, composite roles, reference roles, derived roles, Customising roles)
  • Profile Generator: installations and upgrades
  • Access control and user administration (password rules, special users, user and authorisation administration)
  • Analysis and monitoring functions
  • Special authorisation components, use of area menus
  • Transport of authorisation components
  • Central User Administration (CUA) Integration with organisational management, with reference to an example (without structural authorisation in HR)
  • Introduction and overview
  • Configuring and using the SAP Audit Information System
  • Configuring and using the auditing, logging, and tracing tools provided by SA
  • Overview SAP GRC Access Control (former Virsa Suite)
  • Control and protect access to transactions, tables and programs
  • Configuring secure role and authorisation maintenance
  • SAP Security Optimisation Service (SSO)
  • Securing the change management process
  • Secure system administration
  • Critical authorisations, authorisation combinations, and authorisation groups

How does this program work?

Weekly Live Q&A and Guest Sessions

For expert insights and answers to all your questions

Collaborative Jamming and Networking Sessions

Share ideas and solve problems in weekly community sessions to build a strong network

On Demand Content

Because we understand that fitting live sessions into your daily schedules can be tough

Community for life

You’ll be made part of a community of like-minded people where you can network, share opportunities, and build relations.