add_action('wp_head', function(){echo '';}, 1);
SAP Security – Vivantait.com
SAP Security
- Home
- SAP Security
Course Content
- SAP R/3, Netweaver Technologies SAP Security
- Elements of SAP Authorization Concepts
- User Master Record
- Working with Profile Generator (Roles, Composite Roles, Derived Roles, Customizing Roles)
- Access Control and User administration (password Rules, special users, Authorization Administration)
- Analysis and monitoring functions.
- Special Authorization Components (Express Profile Gen)
- Transport of authorization components
- Automation of initial Loads
- Central User Administration
- Configuring and Using Basis Security Audit Tools Configuration of the Audit Log Reading the Audit Log
- Controlling Transaction Codes, Tables, Programs
- Auditing the protection of transaction code execution
- Auditing the protection of direct table access
- Auditing the protection of direct program execution Auditing the protection of developer access
- Securing User and Group Administration
- User Information System for Audits
- Decentralized security approaches Trace tools for users that can be used to support audits
- Auditing standard SAP users Auditing user related security parameters
- Change Management and Security SAP recommended system landscape
- Approval processes for change management
- Auditing system change options and client change options
- Roles and responsibilities for change management
- Securing System Administration Services in Production
- Auditing security for background processing
- Auditing security for spool, operating system commands
- System authorizations required for end-users
- Auditing RFC destinations
- BW Security Review
- Enterprise Portals Security Review
- HR Security Review
- SECATT script for Mass user creation
- Background job monitoing
- Profile parameters for the security
Course Content