SAP GRC Training

SAP GRC Online Training
  • Introduce SAP Governance, Risk, and Compliance (GRC) 10.0
  • Identify key governance process supported in the GRC 10.0 solution
  • Identify risk process supported in the GRC 10.0 solution
  • Identify compliance processes supported in the GRC 10.0 solution
  • Identify applications that integrate with the GRC 10.0 solution
  • Describe how common functions and relative master data are shared across GRC solutions
  • Describe the IMG organization for GRC 10.0
  • Configure report presentation
  • Configure report structure
  • Configure report content
  • The GRC 10.0 User Interface
  • Work Centers
  • Harmonized Navigation
  • Common Functions and Data
  • User Interface Configuration Framework
  • Shared Master Data
  • Implementation and Configuration
  • Streamlined Configuration
  • Reporting
  • Configure reports without programming

SAP GRC 300 (SAP Access Control 10.0 – Implementation and Configuration)

  • Discuss Harmonization topics as they relate to Access Control
  • Explain how GRC helps you to address business challenges
  • Identify authorization risks in typical business processes
  • Describe the Segregation of Duties Risk Management Process
  • Describe and configure functionality and features for SAP Access Control 10.0
  • Describe the Access Control 10.0 architecture and landscape
  • Describe the Access Control 10.0 Access Control Repository
  • Describe the Access Control 10.0 ¬†Object Level Security
  • Describe how to upgrade from Access Control 5.3 to Access Control 10.0
  • Explain the post-installation steps for Access Control 10.0
  • Describe the Periodic Access Review process
  • Configure Access Control to support the integration of Identity Management
  • Plan for and manage emergency access
  • Discuss the reporting framework
  • Configure workflows, including multi-stage multi-path (MSMP) workflows and BRF+
  • Describe how the different components of the GRC application integrate with each other
  • Discuss key steps in the Access Control implementation process
  • Risk Analysis Framework
  • System-Specific Mitigation
  • Mass Mitigation
  • Emergency Access Management
  • Emergency Access Management Overview
  • Centralized Firefighting
  • Plan for Emergency Access
  • Monitor Emergency Access
  • Design and Manage Roles
  • Configure Role Management
  • Configure Role Methodology
  • Plan for Technical Role Definition
  • Plan for Business Role Definition
  • Consolidate Roles through Role Mining
  • Mass Manage Roles
  • Provision and Manage Users
  • Plan for User Access
  • Plan for Human Resources Integration
  • Define User Provisioning
  • Design End User Personalization Forms
  • Request Approval
  • Periodic Access Review Process
  • Plan Periodic Review
  • Review Access Risk (SoD Review)
  • Monitor User Access
  • Monitor Role Access
  • Business Rule Framework (BRF)
  • Define workflow related Multi-Stage Multi-Path Workflow Rules
  • Define business rules using the BRF Workbench
  • Create BRFplus rules & Reporting
  • Reporting Framework
  • Change Existing Reports
  • Add Custom Fields to Access Requests and Roles
  • Access Control Implementation Process
  • Implementation Process Overview
  • Project Teams
  • Designing the Access Control Solution
  • Upgrade and Migration
  • Configuring Access Control using the IMG
  • Implementing the Solution
  • Optimizing and Enhancing the Solution

Send Enquiry

Your Name (required)

Your Email (required)

Your Phone No. (required)


Your Message