SAP Security Course Content | SAP Security Training in Pune

Page 1

SAP Security Online Training SAP Security Online Training

Duration: 30-35 Hrs Timings: Flexible Fee: As Per the Discussion


About us 

We recognize that many of you are willing to put the extra effort to migrate to SAP practice and become SAP consultants. We help you achieve your goal with a team of experienced SAP instructors, excellent infrastructure, and a clear roadmap to SAP certification.

However, we do not provide false guarantees on securing any SAP jobs for you. We have a history of ex-students who have found excellent SAP jobs based on our SAP training, implementation of case study projects and post training support which we provided during their enrolment.

In short we have what you need at prices you can afford. At SAPVITS our goal is to provide you with courteous, expedient, professional service of the highest caliber.


Features of the Training         

Interactive training for better learning. Pre-evaluations-learn only what you need to learn. Experienced and certified Trainer - More than 8+ years of experience. Convenient weekday and weekend batches available Demo. Timings for the classes are arranged upon flexibility of both the Trainee and the Trainer. Remote 24X7 Server Access will be provided. Lab exercises provided for hands-on training. Soft copy of study material. Access to the recorded videos which you have attended.


SAP Security Training Course Contents

SAP R/3 Security Training o Overview of SAP o Overview of SAP BASIS o Introduction to SAP Security o Why we need security  What needs to be protected?  From whom we need to protect  Implementation methodology

o User administration  Single user administration  Mass User administration  SECATT Script running

o Introduction of CUA (Central User administration)  CUA Configuration for different landscapes  Performing user administration activities in CUA


SAP Security Training Course Contents o User Groups Concept o Role Administration and authorizations concept      

Overview of authorizations and roles Change management process Creating custom authorization objects SAP Role types Working with Profile Generator Creating and modifying different roles

o Authorization Group Concept o Missing authorization o Tracing the user for missing authorization. o Working with R/3 tables, parameters and Reports


SAP Security Training Course Contents

ď‚—

BW/BI Security Training o Architecture and strategies for a BI authorization concept o Security requirements in SAP BI o Standard roles and templates for the authorization concept o Creating BW/BI roles and modification o Difference between BW and R/3 security o Difference between BW and BI Security o Different authorization objects involved in BW/BI o Analysis authorization concept and reporting o Troubleshooting BW/BI issues


SAP Security Training Course Contents

ď‚—

CRM Security Training o

Architecture and strategies for a CRM authorization concept

o

Security requirements in SAP CRM

o

Standard roles and templates for the authorization concept

o

Creating CRM roles and modification

o

Difference between CRM and R/3 security

o

Difference between CRM and BI Security

o

Different authorization objects involved in CRM

o

Troubleshooting CRM issues


Browse our Web site http://www.sapvits.com for more information about SAPVITS.

If you have any questions or would like to speak with a SAPVITS representative regarding our training, please contact us.


Contact us Vintage IT Solutions Website: http://www.sapvits.com/ Email ID: info@sapvits.com IND: +91 992 284 8898 USA: +1 678 389 8898 UK: +44 141 416 8898 YouTube Channel: Vintage IT Solutions


Thank You !!!


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.