Best SAP Security Course Training Institute in Hyderabad,Madhapur,Ameerpet


SAP Security Course Training Institute in Hyderabad:-

SAP-SECURITY  provides security to the users and restricts the unauthorised users. It is a comprehensive way to administer the user.  Sap security safeguarding businesses against the evolving IT threat landscape. It safeguards the data and well-protected from all types of attacks. Sap security takes advantage of robust data and IT security and best sap online training institute in Hyderabad.

Who can learn?

  • Fresh Engineering graduates.
  • Network professionals.

Again candidates with SAP BASIS knowledge are eligible to understand this module of SAP Security. Candidate should have a basic understanding of User Creations, Password Management, and RFC’s. In addition, should have a basic understanding of security terms in the Window and UNIX environment.

Course Content

S.No Component Component Details
1. Overview of the SAP R3 / ECC • Introcuction to ERP
• Security introdcution
• Default user-id’s and clients
• User types
• Creating user id’s
• Overview of sap security (roles and profiles)
• Authorization concepts, transactions, authorization objects
• Introduction to profile generator
• Introduction to composite and derive roles
• Practical exercise building single roles, composite roles and derive roles
• Restriction at object level in PFCG roles
• Securing User and Group Administration
• Adding missing authorization objects
• System trace and su53
• Creating and assigning users to roles
• Transporting user master records
• Transporting single roles
• Transporting mass roles
• Use of pfcg_time_dependency
• Use of user groups in security
• Overview of R/3 client
• Client copy methods
• Client copy requirements and process
• Establishing RFC communications between different systems
• Creating logical systems and assigning logical systems to clients
• Loading the USOBX_C and USOBT_C tables
• Initial copy of SAP defaults into the customer tables (su25)
• How su25, su24 and pfcg are linked
• Use of se16n and se38
• Use of S_TABU_DIS
• Use of sm30
• Continue review of useful tables for security
• User of compare
• User of SUIM reports
• User Information system for Audits
• Central User Administration
• Client concepts
• Securing User and Group Administration
• System security settings scc4, scc1, se03, se06
• Use of supc
• Usmm report
• User classification
• User of sap_all and sap_new
• Audit requirement
• Configuring and Using Basis Security Audit Tools Configuration of the Audit Log Reading the Audit Log
• Security Audit
• How to delete roles
• Use of sap* and ddic
• Transporting Roles
• Usr*, agr*, ush* tables
• Profile parameters for security
• Evaluation reports : rsusr002, rsusr003, rsusr008, rsusr008_009_new, rsusr010, rsusr020, rsusr030, rsusr040, rsusr050, rsusr060, rsusr070, rsusr100, rsusr101, rsusr102, rsusr100_pfcg