SAP Security with GRC Online Training


SAP Security with GRC Online Training Course Details..

Course Based on Software Release
* SAP GRC Access Control 5.3
* SAP ERP Central Control 6.0
* Duration :50 HRS

Contents
1. Overview of SAP Security
* SAP R/3 Architecture
* SAP Basis Security
* Authorization concept
* User and Role creation
* Concept of Derived role
* Derived Role benefits
* Exercise on Role creation (Hands-On)
* Auditing and Monitoring
* Security Reports

2. SoD overview
* SOX Compliance
* SoD Management Process Phases
* SoD Implementation Methodology
* SoD Matrix
* How Risk Analysis & Remediation/CC compatible to SoD’s.

3. Overview of SAP GRC Access Control
* Why GRC?
* SAP GRC Components
* Product architecture
* SAP GRC Access Control 5.3 suite features
* Prerequisites
* Installation
* System Landscape
* SAP GRC Access Control Authorizations

4. Risk Analysis and Remediation
* Overview
* Architecture
* Verification of Installation
* Getting Clean using RAR
* Compliance Calibrator tabs
* Exercise
* Implementation Process Flow
* User Management Engine
* Key Terminology
* Introduction to the SoD Risk Management Process
* RAR Rule Architect – SoD
* Rule Building Process
* Exercise
* Rule Library
* Management View- Risk Violations
* Risk Analysis Adhoc Reports
* Risk Analysis
* Risk Remediation
* Simulation
* Exercise
* Alerts
* Exercise
* Mitigation
* Exercise
* Organizational Rules and Organizational Level Reporting
* Exercise
* Continuous Compliance
* Operational guide
* Exercise

5. Super user Privilege Management
* Overview
* Verification of Installation
* Exercise
* Super user Privilege Management functionality and uses
* SPM configuration
* SPM Reports
* Exercises

6. Compliant User Provisioning
* Overview
* Verification of Installation
* Compliant User Provisioning Functionality
* Integration with RAR & ERM
* Workflow-based Reviews
* Compliant User Management Lifecycle
* Work flow creation
* Super user access workflow
* Request creation and approval flow
* Types of workflows
* Configurations
* Different reports
* Exercises

7. Enterprise Role Management
* Overview
* Verification of Installation
* Configuration Review
* Workflow Steps
* Access Control Integration
* Integration between all Access Control Products
* Compliance Reporting
* Role creation workflow
* Reports
* Exercises

8. Project flow methodology
* Project preparation
* Requirement gathering
* Blue print
* Architecture & SLD
* Operational steps