Up next

SAP GRC Training - Complete SAP GRC 10.1 Video Based Course

15 Views· 16 Aug 2019
M3loma
M3loma
5 subscribers
1

We offer complete Video based SAP GRC Training. Please visit https://www.tekvdo.com/course/....sap-grc-online-train for further details.



There are more SAP GRC Tutorials available in complete course. SAP GRC Training videos will help learning the module at your own pace.The best practice is to watch each video twice with the trainer and try to implement the same steps in your system. This way you will get a good grip in the module.

SAP GRC Introduction
1.1 Introduction
......Why we need SAP GRC
......Target Audience
......Goals for SAP GRC Course
......Objective of the Course
......What is SAP GRC
1.2 Regulations Standards
......Security Standard around the Globe
......Fragmentation on Security Standard
......Integrated GRC and Security Standard
......How to Manage Risk
1.3 Organizational Approach
......Business Challenge and Solution
......Business Risk � Excessive Access
......Who Owns SoD
......Centralized and Decentralized Approach
1.4 SAP GRC Overview
......GRC Interaction
......SAP GRC Process
......Modules of SAP GRC
......Access Control Components
SAP GRC Components
2.1 Access Control
......Access Control Components
......AC Comparison with old version
......Access Risk Analysis
......Access Request Management
......Emergency Access Management
......Business Roe Management
......Risk Terminator
2.2 GRC and AC Harmonization
......Access Control Harmonization
......GRC Harmonization
......IDM Integration
2.3 Process Control
......SAP GRC Process Control
......SAP GRC Process Control
......PC Monitoring Cycle
......Compliance and Visibility
2.4 Global Trade Services
......SAP GTS
......GTS Function
2.5 Risk Management
......Risk Management
......Risk Assessment
......Incident Management
GRC Architecture
3.1 Technical Architecture
......SAP GRC landscape
......SAP GRC Components
......Front END Client
......GRC Portal Content
......Non SAP Plug-Ins, etc
......Access Control Landscape
3.2 User Interface
......Access Work Centers
......Overview Work Center
3.3 GRC Authoirzation
......GRC 10 Authorization
......Access Control Security Objects
SoD Risk Management
4.1 Understanding Authorization Risks
......Segregation of Duties
......Purchase to Pay (P2P) process
......Authorization Risk in HR
4.2 Managing Risk by SoD
SoD Risk Management
......Phases of Risk Management
......Rule Structure, Rule Building
......Risk Management Roles
Customizing GRC Settings
5.1 GRC Settings
......GRC IMG Structure
......Creating & Maintaining Connection
......Managing Connection Setting
......Configuring Integration Scenarios
5.2 Access Control Settings
......BC Sets
......Connection Group
......IMG Configuration
......Plug-in Settings
......AC Customizing
......Define Business Processes
Synchronizing Repository
AC Repository
Synchronizing Jobs
Background Jobs
MSMP Workflow
7.1 MSMP Workflow Introduction
......Business Workflow
......MSMP Initial Configuration
......MSMP Related Roles
7.2 Configuring MSMP
......Process Global Settings
......Maintaining Rules
......Maintaining Agent
......Variable and Templates
......Path and Stage
......Route Mapping
......Generating Versions
Business Rules Framework Plus
8.1 Introduction to Business Rules Framework
......Use of BRFplus
......Components of BRF+
......BRFplus Rule Type
......BRF+ Integration rule for MSMP
8.2 Create BRF+ Rules
......Define MSMP Rules
......Test Result
......Define BRF
......Expression and Function
......Table Condition and Values
Access Risk Analysis
9.1 Maintaining Rule Set
......Rule Set & Hierarchy
......Risk Terminology
......Configuration Setting
......ARA Configuration
......Crating Function and Risk
9.2 Shared Master Data
......Organization Hierarchy
......Mitigation Controls
......Mitigation Monitoring
......PFCG Roles
9.3 Remediating and Mitigating Risk
......Risk Remediating Method
......Mitigating Risk
......Mass Mitigation
......Audit Logs
Emergency Access Management
10.1 Emergency Access Management (EAM) Overview
......EAM Overview
......Key players
......Methods of EAM
......Centralized and Decentralized EAM
10.2 Emergency Access Management Configuration
......Configuration
......Create Firefighter ID
......Assign Owners and Controllers
......Maintain Reason Codes
......Firefight
10.3 Emergency Access Management EAM Logs Reports
......Consolidated Log Report
......BG job for Log Collection
......FF Logs
Access Request Management
11.1 Provisioning Configuration
......Provisioning Setting
......End User Personalization Form
......User provisioning Setting
......Create Template
11.2 Create Access Request
......Access request roles
......Create Request
11.3 Access Request Log and Workflow (MSMP)
......MSMP Workflows
......Access Request Logs
Business Role Management
12.1 Configuring Business Role Management
......BRM Overview
......Role Attributes
......Role Management
......Configure BRM
12.2 Role Methodology & BRF+ Configuration

Show more
100% online learning from the world's best universities, organisations and Instructors

 0 Comments sort   Sort By


Up next