Best Software Training Institute in Ongole

28 years of Excellence

An ISO 9001 : 2015 Certified Institute

Biggest A/C Labs with 300 Computers

Permitted by Government of India

SAP-SECURITY

SAP-SECURITY

WEEK – 1
1. INTRODUCTION TO ERP WORLD
2. EVOLUTION SAP AS A COMPANY
3. ADVANTAGES OF SAP OVER OTHER ERP’S
4. MULTI TIER CLIENT- SERVER SOLUTIONS FROM OF SAP
5. ERP APPLICATIONS OVERVIEW
6. SAP SERVICES OVERVIEW
7. INTRODUCTION TO VARIOUS PLATFORMS OF OS, DB AND HARDWARE
8. CONCEPT OF NETWORKING, DOMAINS, LANDSCAPE ETC.
9. UNDERSTANDING THE VARIOUS TYPES OF PROJECTS IN SAP
10. INTRODUCTION TO THE IMPLEMENTATION METHODOLOGIES (ASAP)
WEEK – 2
11. INTRODUCTION TO DIFFERENT RELEASES OF SAP
12. INTRODUCING THE ARCHITECTURE OF SAP
13. WEB APPLICATION SERVER BASIC CONCEPTS
14. SYSTEM CENTRAL INTERFACES-DISPATCHER- WORK PROCESOR ARCHITECTURE
15. SERVICES- DVEBMGS
16. PRESENTATION INTERFACE
17. DATABASE INTERFACE
18. COMMUNICATION PROTOCOLS AND INTERFACES
19. MEMORY MANAGEMENT
20. SAP WEB AS MULTITIER CLIENT-SERVER ARCHITECTURE
21. INTERNET TRANSACTION SERVER AND INTERNET BUSINESS FRAMEWORK
22. WEB APPLICATION SERVER – INTERNET CONNECTION MANAGER
23. WEB DISPATCHER AND SAP J2EE ENGINE
WEEK – 3 :
SECURITY IN SAP
24. LEVELS OF SECURITY
       1. ACCESS SECURITY
       2. OPERATIONAL SECURITY
       3. DATA SECURITY
25. SAFEGUARDING THE SAP SYSTEM
       1. PREVENTING MULTIUSER LOGON
       2. PASSWORD POLICY IMPLEMENTATION
       3. LIMITING ACCESS TO DEFAULT USERS
       4. LOCKING OF CRITICAL T-CODES
       5. LOCKING THE PRODUCTION SYSTEM
       6. OPERATIONAL SECURITY
26. SECURITY AUDITS
       1. AUUDIT INFORMATION SYSTEM
       2. SECURITY AUDIT LOG
WEEK – 4
27. USER ADMINISTRATION
       1. CREATION OF NEW USERS
       2. COPYING OF EXISTING USERS
       3. MAINTAINING USERS
       4. MASS CHANGES
       5. RESETING THE PASSWORD/ LOCKING AND UNLOCKING OF USERS
       6. USER GROUPS ADMINISTRATION
       7. CONTROLLING OF USERS
             7.1. DELETING OF USER SESSIONS
             7.2.. DISPLAY OF ACTIVE USERS
       8. SPECIAL USER Ids AND SPECIAL AUTHORISATIONS
       9. USER PASSWORD
AUTHORISATION MANAGEMENT
28. AUTHORISATION CHECK PROCESS
29. CREATING AND MAINTAINING SINGLE ROLES
30. CREATING AND MAINTAINING COMPOSITE ROLES
31. AUTHORISATION PROFILES
32. UTILITIES FOR AUTHORISATION MANAGEMENT
        32.1.. DEFAULT VALUES AND CHECK INDICATORS
        32.2.. AUTHORISATION TRACE
        32.3. INFOSYSTEM AUTHORISATIONS