Course Description
In an SAP Distributed Environment, there is always a need that you protect your critical information and data from unauthorized access and also prevent fraud from being carried out within the system/organization.
In this SAP Security and Audit Professional Course, you will learn everything about SAP Security;
- How to Secure the SAP system
- How to manage Users in the SAP System (User Administration)
- How to create Roles in the SAP System (Role Generation)
- How to manage and assign Authorizations to Users within the SAP System (Authorization Concept)
- How to make sure that Users are restricted to their specific Job Roles
- How to Configure and Analyze the Security Audit Log
- How to use the CCMS tool to track user activities within the system
- And many other tools within the SAP System.
BUT WE ARE NOT YET DONE!
Due to the threats and effects of the Covid-19 Pandemic and the requirement that we all stay safe during these times; we have decided to provide remote access into our servers. What this means is that, wherever you may be on the planet, as long as you have an internet connection, you will be able to gain access into our SAP Systems.
You will not only learn about all the beautiful tools and functions within the SAP System, you will also get the OPPORTUNITY To gain access into the SAP system to practice all that you have learnt. But we will not leave you all by yourself!
Our Certified SAP Consultants will always be available to walk you through wherever you seem to get lost.
See you on the inside, Consultant!
Course curriculum
-
1
SAP NetWeaver Application Server Security
-
Evaluating Security Concepts and Security Roadmap
-
NetWeaver Application Server Components and Communication Mechanisms - Determining the Key Points of Network Security
-
Installing and Configuring SAProuter
-
Installing and Configuring SAP Web Dispatcher
-
Evaluating Security Concepts and Security Roadmap Assessment
-
NetWeaver Application Server C&C Learning Assessment - Answers
-
NetWeaver Application Server Security Operations - Secure Store and Secure Storage in File System
-
Authorizations and Security Policies
-
Managing Users in SAP Systems and Securing the Message Server and the Internet Communication Manager (ICM)
-
Securing the SAP GUI
-
Monitoring SAP Systems Security
-
Describing Application Lifecycle Management
-
Segregating System Administration Duties and Managing Transport Management System Users.
-
Monitoring Security with SAP Solution Manager
-
NetWeaver Application Server Security Operations Assessment
-
Basics of Authentication and Single Sign-On - Authentication for SAP NetWeaver AS
-
Discussing Authentication for SAP Netweaver AS Java
-
Single Sign-On with Active Directory
-
Single Sign-On with SAP Logon Tickets
-
Basics of Authentication and Single Sign-On Assessment
-
RFC Security - Securing the RFC Gateway
-
Enabling SNC for SAP NetWeaver AS ABAP
-
Reducing the Attack Surface: RFC Communication and Unified Connectivity
-
RFC Security Assessment
-
Secure Sockets Layer (SSL) for SAP
-
Secure Sockets Layer (SSL) for SAP Assessment
-
Integration B2B - Process Integration and Orchestration
-
Web Services Security in ABAP
-
Integration B2B Assessment
-
Infrastructure - Protecting Operative System Security
-
Protecting Database Security
-
Infrastructure Learning Assessment - Answers
-
-
2
Identity and Access Management in SAP Cloud Platform
-
SAP Cloud Platform Security
-
Describing the Security Setup in SAP Cloud Platform
-
SAP Cloud Platform Identity Provisioning Service
-
SAP Identity Management
-
SAP Cloud Platform Identity Authentication Service
-
Understanding User Management in S/4HANA On-Premise
-
SAP Cloud Platform Security Assessment
-
Unit Assignment
-
-
3
SAP HANA - Authorizations, Scenarios & Security Requirements
-
Introducing SAP HANA Security
-
Outlining security functions
-
Describing SAP HANA implementation scenarios
-
SAP HANA Security Assessment
-
Using SAP HANA administration tools
-
Managing users - Comparing User Types
-
Managing User Groups
-
Describing User Administration Tools
-
Implementing authorizations in the SAP HANA Database - Describing object ownership rules
-
Introducing Authorizations in the SAP HANA Database
-
Introducing database roles management
-
Creating Catalog Roles
-
Creating HDI roles
-
Comparing Role Types
-
Setting up personal database user accounts
-
Managing authentication
-
Describing Cross-Database Authorizations in Tenant Databases
-
Analyzing users and authorizations - Tracing authorization errors
-
Viewing Information about Users and Authorizations
-
Using Audit Logging
-
Managing Audit Logging
-
-
4
Integrated Business Processes in SAP S/4HANA
-
Financial Accounting and Management Accounting: Overview
-
Financial Accounting and Management Accounting: Hands-On 1
-
Financial Accounting and Management Accounting: Hands-On 2
-
Financial Accounting and Management Accounting: Hands-On 3
-
Financial Accounting and Management Accounting: Hands-On 4
-
-
5
Progress Review
-
Please, let us know your experience so far
-
Course Objectives
At the end of this course, you will be able to:
-
Explain SAP Security and Authorization concepts
-
Build and re-design user roles in the SAP System
-
Interact easily with the SAP System
-
Configure and analyse the Security Audit Log
-
Confidently perform SAP Security related tasks and configure tools in the SAP System
FAQ
-
What is the duration of this course?
You move at your own pace; you could complete it between 6-12 weeks.
-
What will I gain from taking this course?
You will be able to implement security controls within an SAP system, protect an organization's critical information and data from unauthorized access and also prevent fraud from being carried out within the SAP system.
-
Are the course content downloadable?
No, the course content is not downloadable EXCEPT where it is specified (e.g. assessments, free E-books and exam materials)
-
Why is SAP Security required in Business organizations?
As more organizations go digital, the need to protect their data and information becomes more important. They need to protect and guard their data and information from risk of fraud by managing authorization access.
-
After taking this course, will I be able to pass the SAP Security certification examination?
Yes, we will guide you and provide you with exam dumps for this course.
Stay Updated!
Add your email to the mailing list to get the latest updates and learning materials!