Best SAP Security Online Course Training Institute


SAP Security Online Course Preparing Establishment:-

SAP-SECURITY  provides security to the clients and confines the unapproved clients. It is a far-reaching approach to direct the client. SAP security shielding organizations against the advancing IT danger scene. It defends the information and all around shielded from a wide range of assaults. SAP security exploits hearty information and IT security and best SAP web-based preparing organization in Hyderabad.

Who can learn?

  • Fresh Engineering graduates.
  • Network professionals.

Again applicants with SAP BASIS knowledge are qualified to comprehend this module of SAP Security. Hopeful ought to have an essential comprehension of Client Creations, Password Management, and RFC’s. Moreover, ought to have a fundamental comprehension of security terms in the Window and UNIX condition.

Course Content:-

S.No Component Component Details
1. Overview of the SAP R3 / ECC • Introduction to ERP
• Security introduction
• User types
• Creating user id’s
• Initial copy of SAP defaults into the customer tables (su25)
• Overview of SAP security (roles and profiles)
• Authorization concepts, transactions, authorization objects
• Introduction to profile generator
• Introduction to composite and derive roles
• Securing User and Group Administration
• Adding missing authorization objects
• The restriction at object level in PFCG roles
• System trace and su53
• Creating and assigning users to roles
• Transporting single roles
• Default user id’s and clients
• Transporting mass roles
• Use of pfcg_time_dependency
• Overview of R/3 client
• Client copy methods
• Practical exercise building single roles, composite roles and derive roles
• Client copy requirements and process
• Establishing RFC communications between different systems
• Creating logical systems and assigning logical systems to clients
• Loading the USOBX_C and USOBT_C tables
• Use of se16n and se38
• Use of S_TABU_DIS
• Use of sm30
• Continue review of using tables for security
• User of compare
• A user of SUIM reports
• Use of user groups in security
• User Information system for Audits
• Central User Administration
• Use of sap* and ddic
• Client concepts
• Securing User and Group Administration
• System security settings scc4, scc1, se03, se06
• Use of spec
• Transporting user master records
• Usmm report
• User classification
• The user of sap_all and sap_new
• Audit requirement
• Configuring and Using Basis Security Audit Tools Configuration of the Audit Log Reading the Audit Log
• Security Audit
• How to delete roles
• Transporting Roles
• Usr*, agr*, ush* tables
• How su25, su24 and pfcg are linked
• Profile parameters for security
• Evaluation reports : rsusr002, rsusr003, rsusr008, rsusr008_009_new, rsusr010, rsusr020, rsusr030, rsusr040, rsusr050, rsusr060, rsusr070, rsusr100, rsusr101, rsusr102, rsusr100_pfcg