Jump to content

Sap Grc Online Training


cssadhar

Recommended Posts

Course Content

  • Introduce SAP Governance, Risk, and Compliance (GRC) 10.0
  • Identify key governance process supported in the GRC 10.0 solution
  • Identify risk process supported in the GRC 10.0 solution
  • Identify compliance processes supported in the GRC 10.0 solution
  • Identify applications that integrate with the GRC 10.0 solution
  • Describe how common functions and relative master data are shared across GRC solutions
  • Describe the IMG organization for GRC 10.0
  • Configure report presentation
  • Configure report structure
  • Configure report content
  • The GRC 10.0 User Interface
  • Work Centers
  • Harmonized Navigation
  • Common Functions and Data
  • User Interface Configuration Framework
  • Shared Master Data
  • Implementation and Configuration
  • Streamlined Configuration
  • Reporting
  • Configure reports without programming 

SAP GRC 300 (SAP Access Control 10.0 - Implementation and Configuration)

  • Discuss Harmonization topics as they relate to Access Control
  • Explain how GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.0
  • Describe the Access Control 10.0 architecture and landscape
  • Describe the Access Control 10.0 Access Control Repository
  • Describe the Access Control 10.0  Object Level Security
  • Describe how to upgrade from Access Control 5.3 to Access Control 10.0
  • Explain the post-installation steps for Access Control 10.0
  • Describe the Periodic Access Review process
  • Configure Access Control to support the integration of Identity Management
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi-path (MSMP) workflows and BRF+
  • Describe how the different components of the GRC application integrate with each other
  • Discuss key steps in the Access Control implementation process
  • Risk Analysis Framework
  • System-Specific Mitigation
  • Mass Mitigation
  • Emergency Access Management
  • Emergency Access Management Overview
  • Centralized Firefighting
  • Plan for Emergency Access
  • Monitor Emergency Access
  • Design and Manage Roles
  • Configure Role Management
  • Configure Role Methodology
  • Plan for Technical Role Definition
  • Plan for Business Role Definition
  • Consolidate Roles through Role Mining
  • Mass Manage Roles
  • Provision and Manage Users
  • Plan for User Access
  • Plan for Human Resources Integration
  • Define User Provisioning
  • Design End User Personalization Forms
  • Request Approval
  • Periodic Access Review Process
  • Plan Periodic Review
  • Review Access Risk (SoD Review)
  • Monitor User Access
  • Monitor Role Access
  • Business Rule Framework (BRF)
  • Define workflow related Multi-Stage Multi-Path Workflow Rules
  • Define business rules using the BRF Workbench
  • Create BRFplus rules & Reporting
  • Reporting Framework
  • Change Existing Reports
  • Add Custom Fields to Access Requests and Roles
  • Access Control Implementation Process
  • Implementation Process Overview
  • Project Teams
  • Designing the Access Control Solution
  • Upgrade and Migration
  • Configuring Access Control using the IMG
  • Implementing the Solution
  • Optimizing and Enhancing the Solution

Contact Us:309-200-3848

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...