*******SAP Security*******
Module 1: Overview of SAP
- Introduction to ERP
- Introduction to SAP & R/3 Architecture ASAP Methodology
- Introduction to HANA AND 54 HANA
- Modules in SAP and their coverage
- Overview of ABAP, BASIS, MM, PP AND SD
Module 2: Basic Settings / SAP Navigation
- Global Settings
- Login
- Sessions
- SAP Screens
- Features of SAP Navigations
- Features of SAP Easy Access Screens
- Features of Implementation Guide Screen
Module 3: SAP R/3 User Administration
- User Administration (SU01)
- User Creation
- User Modification
- User Deletion
- User lock/unlock
- Password Resetting
- Mass User Administration (SU10)
- User Groups
Module 4: Different Security Roles Concepts and Setup
1.Tables Related to User Administration
2.Explain USR40 table.
3.SAP R/3Authorization Concept
- Role administration using PFCG.
- Single roles
- Composite roles
- Derived roles
- Role Transport from Dev to QA & QA to PRD
- Authorization objects
- Authorization in Role administration
- User Buffer/Roles
- Missing Authorization (SU53, 5T01)
Module 5: Security Tables, Transaction Codes and Troubleshooting
- Tables Related to Roles (AGR* Tables)
- Maintenance of Authorization objects (SU24)
- Difference b/w SU24 & SU22
- Troubleshooting (SU53, SU56andSTO01)
- Protect Tables and Transaction codes and Programs.
- User Information System (SUIM)
Module 6: Security Authorization and Profile Parameters
- Security Audit System (SM19, SM20)
- Custom authorization objects
- Password Profile Parameters
- System Profile Parameters
- Central User Administration (CUA) (SM59, SCUA, SCUM, SCUG)
*******SAP GRC*******
Module 7: GRC Overview
- GRC Applications, Requirements, and Benefits
- GRC Landscape
- GRC Release Roadmap and Compatibility
Module 8: Project planning, stakeholders, and Implementation Considerations
- Understand project planning.
- Understand key stakeholders in project.
- Project Implementation Considerations.
Module 9: Risk analysis and Remediation (RAR) – Part 1
- Understanding RAR functionality
- Pre- and post- installation check lists
- Understanding segregation of duties (SOD)
- Understanding RAR data requirements
- Conducting risks and rules workshop
Module 10: Risk analysis and Remediation (RAR) – Part 2
- RAR rule building exercise
- Understanding Remediation and mitigation strategy
- Configuring RAR
- Troubleshooting RAR
Module 11: Super User Privilege Management (SPM)
- Understanding SPM functionality
- Pre- and post- installation check lists
- Understanding SPM data requirements
- Understanding Fire Fighter strategy
- Understanding SAP role, Fire fighter ID and end user ID mapping
- Configuring SPM
- Troubleshooting SPM
Module 12: Complaint user provisioning
- User provisioning process workflow: Role request
- Advanced workflows
- Master data and process logic
- Reporting
- Workflow engine
- Compliance exercise and summary
- Pre- and post- installation check lists
- Conclusion
Module 13: Enterprise role management
- Implementation Methodology in ERM
- Role Generation using ERM
- Pre- and post- installation check lists
- Integration with CUP and RAR
- Proposals in PFCG and GRC
********* PROJECT – Implement SAP GRC and Security for a Live Project
Introduction to Project Use Case
- Implement SAP GRC & SECURITY for a Live Project.
Project Work:
- Understand the requirement and come up with config workbooks.
- Configure SAP GRC & SECURITY as per config workbook.
Module 14: Project Work – Configure SAP GRC & SECURITY as per Client Requirement
- Implement SAP GRC & SECURITY Modules as per Config Workbooks
- Test the setups.
Module 15: SAP GRC & SECURITY Certification Guidance
- Explain various SAP GRC & SECURITY Certification Options
- Discuss Important SAP Certification Exam Questions
- Prepare for SAP GRC & SECURITY Certification
Module 16: Resume Preparation, Interview and Job Assistance
- Prepare Crisp Resume as SAP GRC & SECURITY Specialist
- Discuss common interview questions in SAP GRC & SECURIT
- Provide Job Assistance