SAP GRC Training Online | SAP Security Online Training

SAP GRC Training Online | SAP Security Online Training



SAP GRC Online Training 



Winsomesoft is the Best institute to Learn SAP GRC Training Online with real time scenarios to expand your skills. 



Overview of SOX

Overview of SOD

Introduction to GRC 10.1

• Difference between GRC 5.3 and GRC 10.1

• Overview of different applications in GRC 10.1

• Introduction to different components of GRC AC

Installation of GRC 10.1

• Prerequisites of GRC 10.1 installation

• Post Installation activities of GRC 10.1

• Configuration settings of GRC 10.1  Access Control 10.1 Architecture

GRC 10.1 security and authorizations

• Object level security

• Authorization requirements

• Access Control delivered role

• Shared configuration settings

• Configure the Integration framework

• Configure shared access control settings

• Identify Business Configuration (BC) sets

• Synchronizing with the Access Control Repository

Access Risk Analysis (ARA)

• Creating Rule set,

• Creating Business Processes

• Creating Functions

• Creating SOD Risks

• Creating Critical Role, Profile, Action and Permission

• Risk analysis at user level

• Risk analysis at role level

• Risk analysis at profile level

• Mitigation process

• Creating MIT Control Approvers and Monitors

• Creating Control Id

• Assigning Control Id to Users

• Assigning Control Id to Roles

• Assigning Control Id to Profiles

• Remediation process

• Simulation at user level, role level and profile level

Emergency Access Management (EAM)

• Managing emergency access

• Planning emergency access

• Configuration of EAM component and parameters

• Centralized Emergency Access Management

• Decentralized Emergency Access Management

• Types of EAM users

• Creating Firefighter, Firefighter ID, Firefighter Controller and Firefighter Owner

• Maintaining reason codes

• Assigning firefighter controller and owner to FFID

• Assigning FFID to FF

• Performing Additional Access activities in backend (Business) system by FFID

• Synchronization of FF logs

• Checking FF logs

• Assigning emergency access through Decentralize EAM

Business Role Management (BRM)

• Configuring Business Role Management

• Business Role Methodology

• Implement Condition Groups in Role Management

• Business role definition- Technical role definition

• Maintaining role owners/approvers

• Creating roles by BRM component

• Assigning role owner to role

• Role Mass Maintenance

• Role Mass Import

• Role Mass Update

Role Comparison Role Comparison

• Role Mining

Access Request Management (ARM)

• Provisioning configurations

• End User Personalization (EUP)

• Configuring Approvers and Managers

• Creating access request

• Types of access request

• Creating Template based request

• Creating Model User

• Admin Delegation

• Creating Emergency Access Request

• Responding to access request by the Approver

MSMP Workflow and Business Rule Framework

• MSMP Workflow Introduction

• Configuration of MSMP

• Perform Automatic Workflow Customizing

• Configuring Access Control Process ID’s

• The concept of BRF+ Application

• Initiator rule

• Agent rule

• Routing rule

• Notification and Variable Rule

• Mapping BRF+ rule to standard process id

• Background jobs in GRC AC