SAP GRC TRAINING

COURSE OVERVIEW

WE OFFER

  • Instructor-Led classroom-based training
  • Hands-on Training
  • Free study material
  • Lab Exercises
  • Unlimited lab access
  • 100 % passing guarantee
    or Free Re-training

COURSE INFORMATION

 

  • Fast Track
    Days: Monday-Friday
    Duration: 5 days
  • Slow Track
    Days: Saturdays / Sundays / Evenings
    Duration: 5 Weeks

Study Modes:

  • Classroom / On-site
  • Live Virtual

 

Contact us for more information about this course

For More information call us on

COURSE INSIGHT

SAP GRC (Governance, Risk and Compliance) is a must to have training for individuals who are responsible to manage and control the security aspect of SAP. Usually, this training will allow the participants to learn from basic to advanced level of a security tool in order to ensure the security of potential business data. From this course, you will learn to identify, allow and/or prevent authorized and unauthorized access to the enterprise SAP system. You will also learn to recognize a centralized request for access to the system and assess the risk factors identifying any fraud in the business process.

COURSE OUTLINE

 
  • Introduction to SAP Access Control 10.0
  • Access Control 10.0 Overview
  • Key Features and Benefits
  • Managing Compliance with Access Control 10.0
  • Segregation of Duties Risk Management Process
  • Information Architecture, Security, and Authorizations
 
  • Analyze and Manage Risk
  • Shared Master Data
  • Configuration and Rule Set Maintenance
  • Risk Analysis Framework
  • System-Specific Mitigation
  • Mass Mitigation
 
  • Emergency Access Management Overview
  • Centralized Firefighting
  • Plan for Emergency Access
  • Monitor Emergency Access
 
  • Design and Manage Roles
  • Configure Role Methodology
  • Plan for Technical Role Definition
  • Plan for Business Role Definition
 
  • Provision and Manage Users
  • Plan for User Access
  • Request Approval
  • Review Access Risk (SoD Review)
    • Design SOD Ruleset
    • Critical Permissions
    • Risks and Functions
    • Troubleshooting with Tables and Transactions
  • Monitor User Access
  • Monitor Role Access
 
  • Reporting
  • Reporting Framework
  • Change Existing Reports

TARGET AUDIENCE