Вы находитесь на странице: 1из 11

SAP SECURITY ONLINE

TRAINING IN HYDERABAD,
KOLKATA
Online | classroom| Corporate
Training | certifications | placements| support
Magnific training
India +91-9052666559
USA : +1-678-693-3475
Info@magnifictraining.com
www.magnifictraining.com

Sap security online training in


Pune
Introduction:What is Security? Security concept is same around the
globe like in your normal life, security - means removing
or restricting unauthorized access to your belongings. For
example your Car, laptop or cared cards etc IT Security?

Sap security online training in


Kolkata

Application on R/3 Security.


OS level security & Change management.
Types of Securitys
Internal Security
External Security
SAP Security
User administration & Types of Users.
Central user administration (CUA).

Sap security online training in


Mumbai

Authorizations
Authorization Objects
Authorization profiles
Programming authorizations
Authorization groups
Missing authorizations
Authorization Trace.

Sap security online training in


Hyderabad

Roles
Composite Role
Single Role
Derived Role
Parent Role & Child Role.
Transportation of Roles & Role Mitigation.
The complete User status (SUIM).
Locking transactions.
Restricting access to SAP* & DDIC.

Sap security online training in


Usa

SAP R/3 Security Training


Overview of SAP
Overview of SAP BASIS
Introduction to SAP Security
Why we need security
What needs to be protected
From whom we need to protect
Implementation methodology
User administration
Single user administration

Sap security online training in


UK

SAP History
SAP R/3 architecture & Layers
Client administration
Spool administration Basics
Background jobs
Monitoring
Transport management Basics

Sap security online training in


Malaysia

SAP Role types


Working with Profile Generator
Creating and modifying different roles
Authorization Group Concept
Missing authorization
Tracing the user for missing authorization.
Working with R/3 tables, parameters and Reports
SAP Security Audit

Sap security online training in


India

BI-Security Training
Architecture and strategies for a BI authorization concept
Security requirements in SAP BI
Standard roles and templates for the authorization concept
Creating BW/BI roles and modification
Difference between BW and R/3 security
Difference between BW and BI Security
Different authorization objects involved in BW/BI

Sap security online training in


Canada

Mass User administration


LSMW Script running
Introduction of CUA (Central User administration)
CUA Configuration for different landscapes
Performing user administration activities in CUA
Distributing User/IDOCS and troubleshooting issues
User Groups Concept
Role Administration and authorizations concept
Overview of authorizations and roles
Change management process
Creating custom authorization objects

Вам также может понравиться