Live Webinar - Options for Running Microservices in AWS

closeClose

SAP Security Boot Camp to certification

Course Details
Code: WNASEC-v016
Tuition (USD): $3,750.00 • Virtual (5 days)
$3,750.00 • Classroom (5 days)
Course Details
GSA (USD): $3,037.78 • Virtual (5 days)
$3,037.78 • Classroom (5 days)

Skills Gained

  • Learn about the elements, strategies, and tools of the SAP authorization concept
  • Create and assign authorizations using the Role Administration / Profile Generator
  • Know more about the principle usage of the NetWeaver Identity Management and Central User Administration (CUA)
  • For classroom events this workshop includes the associate exam on the final day (C_AUDSEC_731). For virtual deliveries students will be issued a Pearson VUE Voucher.

Who Can Benefit

  • System Administrator
  • Technology Consultant

Prerequisites

  • *Essential:
       -SAPTEC *Recommended:
       -none

Course Details

Course Content

  • Authorization Concepts for Compliant Identity Management
       -Working with Identity Management (IDM)
       -Working with Governance, Risk and Compliance (GRC)
       -Working with Compliant Identity Management (CIM)
       -Designing an Authorization Concept for an AS ABAP based system
       -Implementing an Authorization Concept for an AS ABAP based system
       -Authorization Terminology
       -Working with the Elements and Terms of an Authorization concept
       -Checking authorization in an ABAP systems
  • User Maintenance
       -Working with different User sources
       -Maintaining User
  • Basic Role Maintenance
       -Defining a role
       -Defining authorizations in a role
       -Creating composite roles
       -Creating reference and derived roles
  • Advanced Role Maintenance
       -Using subtleties of the authorization maintenance
       -Defining authorizations for system user
  • Configure authorization environment
       -Installing and Upgrade the role maintenance
       -Configuring the role maintenance
       -Defining system settings
       -Analyzing authorization
  • Compliance and Provisioning Applications from SAP
       -Explaining SAP Governance, Risk, and Compliance (SAP GRC)
       -Describing SAP GRC
       -Using Identity Management (IdM)
       -Implementing Central User Administration (CUA)
  • Infrastructure Security
       -Enabling Secure Network Communication (SNC)
       -Enabling Secure Socket Layer (SSL)
       -Implementing Single Sign-On (SSO) in SAP Systems
  • Audit Information System (AIS) and the Audit Information System Cockpit
       -Configuring and Using the AIS
       -Performing a System Audit Using the Audit Cockpit
  • User and Authorization Audit
       -Customizing the Role Maintenance Tool
       -Analyzing and Securing Users
  • System Audit
       -Configuring and Using the Security Audit Log
       -Securing System Administration Services
  • Security Assessment
       -Optimizing Security Using SAP Security Optimization Self-Service
       -Consulting SAP Security Notes