Best Software Training Institute in Ongole

28 years of Excellence

An ISO 9001 : 2015 Certified Institute

Biggest A/C Labs with 300 Computers

Permitted by Government of India




2.Overview of SOX


3.Overview of SOD


4.Introduction to GRC 10.0


4,1.Difference between GRC 5.3 and GRC 10.0

4.2.Difference between GRC 5.3 and GRC 10.0

4.3.Overview of different application in GRC 10.0

4.4.Introduction to different components of GRC AC


5.Installation of GRC 10.0


5.1.Prerequisites of GRC 10.0 installation

5.2.Post Installation activities of GRC 10.0

5.3.Configuration settings of GRC 10.0


6.Access Control 10.0 Architecture


7.GRC 10.0 security and authorizations


7.1.Object level security

7.2.Authorization requirements

7.3.Access Control delivered role

7.4.Shared configuration settings

7.5.Configure the Integration framework

7.6.Configure shared access control settings

7.7.Identify Business Configuration (BC) sets


8.Access Risk Analysis (ARA)


8.1.Creating Rule set

8.2.Creating Business Process

8.3.Creating Risk

8.4.Creating Function

8.5.Risk analysis at user level

8.6.Risk analysis at role level

8.7.Mitigation process

8.8.Remediation process


8.10.Creating Control Id

8.11.Assigning Control Id to Users

8.12.Assigning Control Id to Roles


9.Emergency Access Management (EAM)


9.1.Managing emergency access

9.2.Planning emergency access

9.3.Types of EAM users

9.4.Creating firefighter, firefighter ID, firefighter controller and firefighter owner

9.5. Maintaining reason codes

9.6. Assigning firefighter controller and owner to FFID

9.7. Assigning FFID to FF

9.8.Checking FF logs


10.Business Role Management (BRM)


10.1.Post installation activities of BRM

10.2.Creating a role by BRM component

10.3.Business role definition- technical role definition

10.4.Creating single role

10.5.Creating composite role

10.6.Creating Business role

10.7.Maintaining role owners/approvers

10.8.Assigning role owner to role


11.Access Request Management (ARM)


11.1.Creating access request

11.2.Types of access request

11.3.Responding to access request

11.4.Designing end user personalization form

11.5.Comparison with CUP


12.MSMP Workflow and Business Rule Framework


12.1.The concept of BRF+ rule\

12.2.Process ID

12.3.Initiator rule

12.4.Agent rule

12.5.Routing rule

12.6.Creating BRF + rule

12.7.Maintain multistage multipath (MSMP) workflow

12.8.Standard process id’s

12.9.Linking BRF+ rule to standard process id

12.10.Background jobs in GRC AC 10.0