CSCT > SAP SECURITY TRAINING
SAP SECURITY TRAINING
Introduction to ECC security
Overview of security concepts
User administration
Role administration
composite roles and derived roles
14 students enrolled
The Online SAP Security Training includes following topics
- Introduction to ECC security
- Overview of security concepts
- User administration
- Role administration
- composite roles and derived roles
- Addition of missing authorization object
- User tables
- Types of users
- Types of Status texts
- Types of Roles
- Role comparison
- Default user ids
- System Trace
- Inactivation Authorization objects
- use of SM30 and SM31
- use of se16 and authorization object S_TABU_DIS
- Difference between SU24 and Su25
- Use of user groups
- How to run the reports using SUIM
- Evaluation reports like RSUSR002,RSUSR040 AND RSUSR003
- How to run the user inactivity using specific program
- Difference between Standard roles and Customized roles
- Creation of oss users?
- Audits
- Critical transactions which are not to be assigned to all users
- Transporting roles
- How to handle the tickets in real scenario
Overview of HR security
Overview of GRC
Overview of BI security
Interview questions
Be the first to add a review.
Please, login to leave a review
-
HadoopFreeBy CSCT -
Oracle TrainingFreeBy CSCT -
SeleniumFreeBy CSCT -
Web ServicesFreeBy CSCT -
HibernateFreeBy CSCT -
SpringFreeBy CSCT -
Advanced JavaFreeBy CSCT -
Core JavaFreeBy CSCT -
Data StructureFreeBy CSCT -
C++FreeBy CSCT -
C LanguageFreeBy CSCT -
PythonFreeBy CSCT -
SalesforceFreeBy CSCT -
DevOpsFreeBy CSCT -
AWSFreeBy CSCT