SAP BASIS Security Online Training In USA

SAP BASIS Security Online Training

SAP BASIS Security Online Training
SAP BASIS Security Online Training

SAP BASIS Security Online Training Course Content :

SAP R/3 Security

  • Overview of SAP
  • Overview of SAP BASIS
  • Introduction to SAP Security
    • Why we need security
    • What needs to be protected
    • From whom we need to protect
    • Implementation methodology
  • User administration
    • Single user administration
    • Mass User administration
    • LSMW Script running
  • Introduction of CUA (Central User administration)
    • CUA Configuration for different landscapes
    • Performing user administration activities in CUA
    • Distributing User/IDOCS and troubleshooting issues
  • User Groups Concept
  • Role Administration and authorizations concept
    • Overview of authorizations and roles
    • Change management process
    • Creating custom authorization objects
    • SAP Role types
    • Working with Profile Generator
    • Creating and modifying different roles
  • Authorization Group Concept
  • Missing authorization
  • Tracing the user for missing authorization.
  • Working with R/3 tables, parameters and Reports
  • SAP Security Audit

BW/BI Security

  • Architecture and strategies for a BI  authorization concept
  • Security requirements in SAP BI
  • Standard roles and templates for the  authorization concept
  • Creating BW/BI roles and modification
  • Difference between BW and R/3 security
  • Difference between BW and BI Security
  • Different authorization objects involved  in  BW/BI
  • Analysis authorization concept and  reporting
  • Troubleshooting BW/BI issues

HR Security

  • Introduction to HR security
  • Personal administration and  Organizational management
  • HR General and Structural authorizations
  • HR authorization objects and info types
  • Troubleshooting HR issues

GRC (Governance, Risks and Compliances 5.3

  • Introduction to GRC
  • Sarbanes Oxley Rules (SOX)
  • In depth discussion  of GRC  Components
    • Compliance User Provisioning (CUP)
    • Risk Analysis and Remediation (RAR)
    • Enterprise Role management (ERM)
    • Super User Privilege Management  (SPM)
  • Working with functions, Risks and Mitigation Controls
  • Introduction to GRC 10.

Drop your query

What my Client's Say?


  • Prabhu is an excellent instructor, very patient and thorough. I have tried another training class and EXPLORE IT far exceeds other trainers and their methods ~ Hassan Malik

  • An extremely helpful and informative course. Training materials were well organized and provided good case studies. Instructor was extremely professional and pleasant to learn from.~ Bhavani Sudarshnam

  • The training was clear and detailed. I like Parker's style of teaching as the recurrent training is a thorough review of the HR. Every opportunity for the student to ask questions was provided. ~ Yiting Chen

  • Jane Anderson conducted the class in a very professional manner. Examples were very relevant and I feel that I gained a lot from the updated materials this year.~ Somesh Taneja

  • Prem was a great instructor. Thanks Prem for making the training easy to understand. A lot of information was covered. He made the approach easy to follow.~ Komali Sambakula

  • She wants to make sure that her students walk away from her course with a good working knowledge. She is an excellent trainer and cares that all of her students learn the material.~ Kiran Jain

  • Krishna is very thorough and professional. He made the code very understandable. I was very impressed with his teaching methods and presentation of the regulations. EXPLORE IT is the best! ~ Rajesh Isukapalli

  • Mr. Chris Brown was very affirmative with the course, on time and fluent. This is my second recourse with him. I hope to take his course as long as I am shipping at my current job. ~ Awais Rahim