Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Secure SAP System Management_ADM950v15 (EHP7 For ERP 6.0)

GK# 2070 Vendor# ADM950v15

Course Overview

TOP

In this course, you will learn how to secure an SAP system. Data protection, security monitoring, SAP GRC access control, as well as SAP role maintenance and change management mechanisms are covered in this course. This course assumes that you are familiar with many SAP system administration and system architecture functions. This course is based on software release SAP ECC 6.07 / SAP NetWeaver AS 7.40.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Identify and protect sensitive data and mechanisms in live solutions based on SAP NetWeaver Application Server
  • Use the SAP Audit Information System to structure and conduct thorough security checks and configure important security monitoring mechanisms
  • Explain the features of SAP GRC Access Control
  • Configure standard SAP role maintenance tools to produce secure company-specific roles and authorization profiles
  • Implement und use the SAP Security Optimization Service (SOS)
  • Secure change management mechanisms in production system landscapes and protect system administration tools from misuse

Outline

TOP
Viewing outline for:

Classroom Live Outline

1. Introduction to Internal Security Auditing

  • Describing Security Auditing

2. Audit Information System (AIS) and the Audit Information System Cockpit

  • Configuring and Using the AIS
  • Performing a System Audit Using the Audit Cockpit

3. User and Authorization Audit

  • Customizing the Role Maintenance Tool
  • Analyzing and Securing Users
  • Describing Segregation of Duties and Critical Authorization
  • Securing the System by Login-Related Parameters

4. System Audit

  • Configuring and Using the Security Audit Log
  • Securing System Administration Services

5. Applications and Logs in AS ABAP

  • Monitoring AS ABAP Using Logs

6. Security in Change Management

  • Securing Change Management

7. Security Assessment

  • Optimizing Security Using SAP Security Optimization Self-Service
  • Consulting SAP Security Notes
  • Implementing and Checking Technical Security Recommendations

Prerequisites

TOP
  • Knowledge of security issues, technical background (Web technologies, SAP ITS, fundamental knowledge of SAP systems) is recommended
  • ADM940 Authorization Concept AS ABAP is recommended

Who Should Attend

TOP
  • Technical consultant
  • System administrator

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 2 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 2 day

Request this course in a different delivery format.
Enroll