SAP Security Online Training - PowerPoint PPT Presentation

About This Presentation
Title:

SAP Security Online Training

Description:

Keen Online Training offers SAP Security Online Training.Our SAP Security trainers are highly talented and well experienced trainers. Our SAP Security online training is one of the Best online training in the India. All our students were happy With our online training and able to find Jobs quickly in USA, UK, Singapore, Japan, Europe, Dubai, India and many more countries. keen online training is your one stop solution to learn SAP Security at your home with flexible schedules. SAP Security Online Training – PowerPoint PPT presentation

Number of Views:40
Slides: 12
Provided by: divyakeen

less

Transcript and Presenter's Notes

Title: SAP Security Online Training


1
SAP SECURITY Online Training
2
  • 1 SAP R/3 Security       1.1      Overview of
    SAP1.2      Overview of SAP BASIS1.3     
    Introduction to SAP Security          
    1.3.1      Why we need security          
    1.3.2      What needs to be protected          
    1.3.3      From whom we need to
    protect           1.3.4      Implementation
    methodology

3
  • 1.4      User administration          
    1.4.1       Single user administration          
    1.4.2       Mass User administration          
    1.4.3       LSMW Script running1.5     
    Introduction of CUA (Central User
    administration)           1.5.1       CUA
    Configuration for different landscapes          

4
  • 1.5.2       Performing user administration
    activities in CUA
  •  1.5.3      Distributing User/IDOCS and
    troubleshooting issues1.6      User Groups
    Concept1.7      Role Administration and
    authorizations concept           1.7.1      
    Overview of authorizations and roles          

5
  • 1.7.2       Change management
    process           1.7.3       Creating custom
    authorization objects
  •   1.7.4       SAP Role types          
    1.7.5       Working with Profile
    Generator           1.7.6       Creating and
    modifying different roles

6
  • 1.8      Authorization Group Concept1.9     
    Missing authorization1.10    Tracing the user
    for missing authorization.1.11    Working with
    R/3 tables, parameters and Reports1.12    SAP
    Security Audit.

7
  • 2.     BW/BI Security2.1     Architecture and
    strategies for a BI authorization concept2.2    
    Security requirements in SAP BI2.3     Standard
    roles and templates for the authorization concept

8
  • 2.4     Creating BW/BI roles and
    modification2.5      Difference between BW and
    R/3 security2.6      Difference between BW and
    BI Security2.7      Different authorization
    objects involved in  BW/BI2.8      Analysis
    authorization concept and reporting2.9     
    Troubleshooting BW/BI issues 

9
  • 3 HR Security3.1      Introduction to HR
    security3.2      Personal administration and
    Organizational management3.3      HR General and
    Structural authorizations3.4      HR
    authorization objects and info types3.5     
    Troubleshooting HR issues

10
  • Contact us
  • Ind- 9989754807
  • US 475 212 0075
  • Aus 61280917878
  • www.keentechnologies.com

11
  • THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com