Facebook
Twitter
LinkedIn

1-855-414-4447

Teczones
  • Home
  • About Us
  • Portfolio
  • Services
    • Managed Services
    • IT Trainings
    • Staffing Services
    • Web Development
    • Mobile App
  • Products
  • Blog
  • Career
  • Contact
  • Login

With technological advancements, design and development
has undergone radical changes due to excessive use.

SAP Security Course Syllabus
Training Hours: 60-80

  1. Introduction to ERP-SAP
    1. What is ERP
    2. Evolution of ERP
    3. Business process before & after ERP
    4. What is SAP
    5. Why SAP
    6. Modules of SAP
    7. SAP Architecture
    8. SAP System Landscapes
    9. Installing SAP Frontend/GUI
    10. SAP Logon Pad & Server configuration
  1. Introduction to SAP Security
    1. What is Security
    2. Overview of Security
    3. Why Security is important
    4. Authentication & Authorization
    5. SAP Access Control
    6. Policies & Procedures
    7. Security Administration Tasks
    8. Security Administration Organization
    9. Commonly used Transaction Codes in SAP Security
  1. Authorization Concept
    1. Overview
    2. Development of an Authorization concept
    3. Role & Authorization concept
    4. Implementing User & Authorization Administration
  1. User Master Record
    1. Introduction
    2. Description of various tabs on User Master Record
    3. User Types
    4. Mass Changes
  1. Working with Profile Generators
    1. Introduction to PFCG
    2. PFCG Process steps
    3. Special PFCG Roles
  1. Basic Setting
    1. Profile Generator Installation & Upgrade
    2. Access Control & User Administration
    3. Trouble Shooting & Administration aids
  1. Transporting Authorization
    1. Copy user master records to other clients
    2. Transport roles and describe the behavior in the system: With and without

Profile information, with and without user assignments, in a CUA landscape

Or without CUA

    1. Transport check indicators using Transaction SU25
  1. Integration into company landscape
    1. Working with central user administration
    2. Integration into organizational management

Facebook
Twitter
LinkedIn
Copyright © 2016 Teczones All rights reserved.