SAP GRC

There are many suppliers of information technology offer technology GRC solutions.

SAP GRC Online Training

It incorporate all the process solutions and components of SAP solutions for Governance, Risk and Compliance. SAP GRC allows access to the company they need for their daily work. The risk of unapproved access is detected and automatically ease.

What you will learn

Technodips have a team of SAP GRC experts who are working professionals with hands on real time SAP GRC projects knowledge, which will give students an edge over other Online Training Institutes.

  • Overview of SOX

SAP GRC Course Content

 

  • Overview of SOX
  • Overview of SOD
  • Introduction to GRC 10.1
  • Difference between GRC 5.3 and GRC 10.1
  • Overview of different applications in GRC 10.1
  • Introduction to different components of GRC AC
  • Installation of GRC 10.1
  • Prerequisites of GRC 10.1 installation
  • Post Installation activities of GRC 10.1
  • Configuration settings of GRC 10.1
  • Access Control 10.1 Architecture
  • GRC 10.1 security and authorizations
  • Object level security
  • Authorization requirements
  • Access Control delivered role
  • Shared configuration settings
  • Configure the Integration framework
  • Configure shared access control settings
  • Identify Business Configuration (BC) sets
  • Access Risk Analysis (ARA)
  • Creating Rule set
  • Creating Business Process
  • Creating Risk
  • Creating Function
  • Risk analysis at user level
  • Risk analysis at role level
  • Risk analysis at profile level
  • Mitigation process
  • Remediation process
  • Simulation at user level, role level and profile level
  • Remediation process
  • Mitigation process
  • Creating Control Id
  • Assigning Control Id to Users
  • Assigning Control Id to Roles
  • Assigning Control Id to Profiles
  • Emergency Access Management (EAM)
  • Configuration of EAM component and parameters
  • Managing emergency access
  • Planning emergency access
  • Types of EAM users
  • Creating firefighter, firefighter ID, firefighter controller and firefighter owner
  • Maintaining reason codes
  • Assigning firefighter controller and owner to FFID
  • Assigning FFID to FF
  • Performing Additional Access activities in backend (Business) system by FFID
  • Synchronization of FF logs
  • Checking FF logs

 

  • Business Role Management (BRM)
  • Configuring Business Role Management
  • Business Role Methodology
  • Creating roles by BRM component
  • Business role definition- technical role definition
  • Role Mass Maintenance
  • Role Mass Import
  • Role Mass Update
  • Role Comparison
  • Role Mining
  • Maintaining role owners/approvers
  • Assigning role owner to role
  • Access Request Management (ARM)
  • Provisioning configuration
  • End User Personalization (EUP)
  • Configuring Approvers and Managers
  • Creating access request
  • Types of access request
  • Creating Template based request
  • Creating Model User
  • Responding to access request by the Approver
  • Comparison with CUP
  • MSMP Workflow and Business Rule Framework
  • MSMP Workflow Introduction
  • Configuring MSMP
  • Perform Automatic Workflow Customizing
  • The concept of BRF+ rule
  • Process ID
  • Initiator rule
  • Agent rule
  • Routing rule
  • Notification and Variable Rule
  • Maintain multistage multipath (MSMP) workflow
  • Standard process id's
  • Linking BRF+ rule to standard process id
  • Background jobs in GRC AC 10
Back to top