SAP Security and Auithorization’s Course gives technical consultants environment.

SAP Security Online Training

SAP Security and Auithorization’s Course gives technical consultants environment, IT managers, administrators and authorization of in-depth look at all aspects of IT security in the SAP NetWeaver.

What you will learn

An introduction to the overall subject matter helps you get up to speed quickly on topics like risk evaluation, creating control options, designing security measures – and teaches you the appropriate procedures for Implementing the supporting processes.

  • SAP R/3 Security
  • BW/BI Security

SAP SECURITY Online Training Course Content


  • SAP R/3 Security
  • Overview of SAP
  • Introduction to SAP Security
  • Why we need security
  • What needs to be protected
  • From whom we need to protect
  • User administration
  • Singe user administration
  • Mass User administration
  • LSMW Script running
  • Introduction of CUA (Central User administration)
  • CUA Configuration for different landscapes
  • Performing user administration activities in CUA
  • Distributing User/IDOCS and troubleshooting issues
  • User Groups Concept
  • Overview of authorizations and roles
  • Change management process
  • Creating custom authorization objects
  • SAP Role types
  • Working with Profile Generator
  • Creating and modifying different roles
  • Authorization Group Concept
  • Missing authorization
  • Tracing the user for missing authorization.
  • Working with R/3 tables, parameters and Reports
  • SAP Security Audit


  • BW/BI Security
  • Architecture and strategies for a BI authorization concept
  • Standard roles and templates for the authorization concept
  • Creating BW/BI roles and modification
  • Difference between BW and R/3 security
  • Difference between BW and BI Security
  • Different authorization objects involved in BW/BI
  • Analysis authorization concept and reporting
  • Troubleshooting BW/BI issues
  • Security
  • Introduction to HR security
  • Personal administration and
  • HR General and Structural authorizations
  • HR authorization objects and info types
  • Troubleshooting HR issues
  • GRC (Governance, Risks and Compliances 5.3
  • Introduction to GRC
  • Sarbanes Oxley Rules (SOX)
  • In depth discussion of GRC
  • Compliance User Provisioning (CUP)
  • Risk Analysis and Remediation (RAR)
  • Enterprise Role management (ERM)
  • Working with functions, Risks and
  • Mitigation Controls
  • Introduction to GRC 10.
Back to top