SAP Technical /
SAP Basis Security

SAP Basis Security

SAP Basis Security Online Training:

Who is Eligible:

Any Graduates/Post Graduates are eligible.
Any Functional/technical background consultants are eligible to learn SAP Basis Security Online Training.

  • 1

    Introduction & Overview

    00:00
  • 1

    Attendees should be challenging to administer the security of the SAP Business Application software

    00:00
  • 1

    SAP R/3, Netweaver Technologies SAP Security

    00:00
  • 2

    Elements of SAP Authorization Concepts

    00:00
  • 3

    User Master Record

    00:00
  • 4

    Working with Profile Generator (Roles, Composite Roles, Derived Roles, Customizing Roles)

    00:00
  • 5

    Access Control and User administration (password Rules, special users, Authorization Administration)

    00:00
  • 6

    Analysis and monitoring functions

    00:00
  • 7

    Special Authorization Components (Express Profile Gen)

    00:00
  • 8

    Transport of authorization components

    00:00
  • 9

    Automation of initial Loads

    00:00
  • 10

    Central User Administration

    00:00
  • 11

    Controlling Transaction Codes, Tables, Programs

    00:00
  • 12

    Auditing the protection of transaction code execution

    00:00
  • 13

    Auditing the protection of direct table access

    00:00
  • 14

    Auditing the protection of direct program execution Auditing the protection of developer access

    00:00
  • 15

    Securing User and Group Administration

    00:00
  • 16

    User Information System for Audits

    00:00
  • 17

    Decentralized security approaches Trace tools for users that can be used to support audits

    00:00
  • 18

    Auditing standard SAP users Auditing user related security parameters

    00:00
  • 19

    Change Management and Security SAP recommended system landscape

    00:00
  • 20

    Approval processes for change management

    00:00
  • 21

    Auditing system change options and client change options

    00:00
  • 22

    Roles and responsibilities for change management

    00:00
  • 23

    Securing System Administration Services in Production

    00:00
  • 24

    Auditing security for background processing

    00:00
  • 25

    Auditing security for spool, operating system commands

    00:00
  • 26

    System authorizations required for end-users

    00:00
  • 27

    Auditing RFC destinations

    00:00
  • 28

    BW Security Review

    00:00
  • 29

    Enterprise Portals Security Review

    00:00
  • 30

    HR Security Review

    00:00
  • 31

    SECATT script for Mass user creation

    00:00
  • 32

    Background job monitoing

    00:00
  • 33

    Profile parameters for the security

    00:00
NA