SAP SECURITY TRAINING

Introduction to ECC security
Overview of security concepts
User administration
Role administration
composite roles and derived roles

14 students enrolled

The Online SAP Security Training includes following topics

  • Introduction to ECC security
  • Overview of security concepts
  • User administration
  • Role administration
  • composite roles and derived roles
  • Addition of missing authorization object
  • User tables
  • Types of users
  • Types of Status texts
  • Types of Roles
  • Role comparison
  • Default user ids
  • System Trace
  • Inactivation Authorization objects
  • use of SM30 and SM31
  • use of se16 and authorization object S_TABU_DIS
  • Difference between SU24 and Su25
  • Use of user groups
  • How to run the reports using SUIM
  • Evaluation reports like RSUSR002,RSUSR040 AND RSUSR003
  • How to run the user inactivity using specific program
  • Difference between Standard roles and Customized roles
  • Creation of oss users?
  • Audits
  • Critical transactions which are not to be assigned to all users
  • Transporting roles
  • How to handle the tickets in real scenario
 

Overview of HR security

Overview of GRC

Overview of BI security

Interview questions

Be the first to add a review.

Please, login to leave a review