X
New User Registration
*Required field

SAP Security Training

An organization has classified and confidential data and not everybody should be allowed to get access to it. SAP Security is a set of functions designed to offer a layer of security to each module within the ERP system. Security is implemented at two distinct layers: application and business layer. There are different approaches that can be adopted in order to detect a security lapse and trigger actions to mitigate its spread. The action can be organizational or technical depending on the scenario.

There are three types of SAP Security: Segregation of Duties or SoD, Custom Code Security, and Application Platform Security. Each type is seen as a function of different modules or departments within SAP. The first type defines access control rules. By using this level, the users who have limited privileges to access certain organizational data can be controlled.

Code Security is implemented to address vulnerabilities in the programs developed for SAP extension of applications. These are mostly technical issues related to coding including logging and encryption. Application platform security is also known as SAP Cyber Security, which is the most important of all. At these three levels, security needs to be very tight so that the entire SAP system can be made reliable and difficult to break into.

Buying Options

SAP Security
Training

OR

Buy 2 Modules &
Get 1 For Free

SAP Security Training Videos Duration 5hours

Tutorial Topics

Security

SECTION 1 SAP Security Concepts 1.Introduction to SAP Security

5:41 Minutes

SECTION 1 SAP Security Concepts 2.User Master Record

6:54 Minutes

SECTION 1 SAP Security Concepts 3.Authorization Check

6:50 Minutes

SECTION 1 SAP Security Concepts 4.Select Authorization Concept

11:41 Minutes

SECTION 2 SAP User Maintenance 1.User Types in SAP R 3

6:50 Minutes

SECTION 2 SAP User Maintenance 2.User Maintenance in SAP R3

8:09 Minutes

SECTION 2 SAP User Maintenance 3.Login Profile Parameters

6:58 Minutes

SECTION 3 SAP Role Concept, Design and Maintenance 1.Roles and Authorizations in SAP

8:04 Minutes

SECTION 3 SAP Role Concept, Design and Maintenance 2.Parent and Derived Roles

8:36 Minutes

SECTION 3 SAP Role Concept, Design and Maintenance 3.Composite Roles

7:51 Minutes

SECTION 4 SAP ECC Security 1.Organizational Levels in SAP

7:16 Minutes

SECTION 4 SAP ECC Security 2.Authorization Groups

13:53 Minutes

SECTION 4 SAP ECC Security 3.Security Tables

10:24 Minutes

SECTION 4 SAP ECC Security 4.Critical Basis Authorizations

6:31 Minutes

SECTION 4 SAP ECC Security 5.Custom Auth Objects

8:59 Minutes

SECTION 4 SAP ECC Security 6.Default Users in SAP

6:22 Minutes

SECTION 4 SAP ECC Security 7.SAP Delivered Checks

8:25 Minutes

SECTION 4 SAP ECC Security 8.SAP Profile Reconciliation – PFUD

3:30 Minutes

SECTION 4 SAP ECC Security 9.SAP ABAP Security

18:40 Minutes

SECTION 5 SAP Security on HANA 1.Creating Users in HANA Studio

8:13 Minutes

SECTION 5 SAP Security on HANA 2.User Administration in SAP HANA

15:34 Minutes

SECTION 5 SAP Security on HANA 3.Role Concept

5:24 Minutes

SECTION 5 SAP Security on HANA 4.Authentication in SAP HANA

18:01 Minutes

SECTION 5 SAP Security on HANA 5.Authorization Methods in SAP HANA

22:21 Minutes

SECTION 5 SAP Security on HANA 6.Auditing in SAP HANA

7:03 Minutes

SECTION 6 SAP Security Reporting 1.SAP User Information System

9:06 Minutes

SECTION 7 Security Support and Troubleshooting – Tips and Tricks 1.Display Auth Data in SU53

11:39 Minutes

SECTION 7 Security Support and Troubleshooting – Tips and Tricks 2.ST01 Trace in Security

5:22 Minutes

SECTION 8 SAP Upgrades 1.SU24 Maintain Check Indicators

5:56 Minutes

SECTION 8 SAP Upgrades 2.Copy Check Indicators – SU25

7:14 Minutes

SECTION 9 SAP AS JAVA Security 1.SAP AS JAVA Security

11:01 Minutes

SECTION 9 SAP AS JAVA Security 2.Portal Permissions

5:44 Minutes

SECTION 9 SAP AS JAVA Security 3.UME SAP User Management

5:00 Minutes

SECTION 9 SAP AS JAVA Security 4.UME SAP Roles Mangement

3:23 Minutes

SECTION 9 SAP AS JAVA Security 5.SAP UME Group Management

2:57 Minutes

SECTION 10 SAP Business Objects Security 1.Central Management Console – CMC

7:55 Minutes

SECTION 10 SAP Business Objects Security 2.Creating Users and Groups in CMC

8:31 Minutes

SECTION 10 SAP Business Objects Security 3.Access Levels

6:46 Minutes

SECTION 11 SAP Technical Know how to Manage SAP Security 1.Central User Administration – CUA

9:51 Minutes

SECTION 11 SAP Technical Know how to Manage SAP Security 2.Maintain T-Code using SE93

3:54 Minutes

SECTION 11 SAP Technical Know how to Manage SAP Security 3.SU10 – Mass User Maintenance in SAP

5:02 Minutes

SECTION 12 Conclusion Conclusion

2:23 Minutes