SAP GRC

20 hours

In this SAP GRC training you will learn about the Governance, risk and compliance. About the governance it is about how you should manage the responsibilities and how should you manage the organization, Compliance is how do the rules and policies be relevant and risk is identified through the risk management then measured and reported. SAP GRC training, will help you improve the business, indemnity will be in control.

  • Course completion certificate, Certification documents and materials, interview questions included.
  • Mode of Study – Online Self Learning
  • 24/7 support

lIFETIME ACCESS

INR 999

SAP GRC Course Content

  • Overview of SOX
  • Overview of SOD
  • Introduction to GRC 10
  • Difference between GRC 5.3 and GRC 10
  •  Overview of different applications in GRC 10                 
  •  Introduction to different components of GRC AC  
  •  Prerequisites of GRC 10 installation
  • Post Installation activities of GRC 10
  • Configuration settings of GRC 10
  • Access Control 10 Architecture
  • GRC 10 security and authorizations
  • Object level security
  •  Authorization requirements
  •  Access Control delivered role
  •  Shared configuration settings
  •  Configure the Integration framework
  •  Configure shared access control settings
  •  Identify Business Configuration (BC) sets
  • Access Risk Analysis (ARA)
  • Creating Rule set,
  • Creating Business Process
  • Creating Risk
  • Creating Function
  • Risk analysis at user level
  • Risk analysis at role level
  • Risk analysis at profile level
  • Mitigation process
  • Remediation process
  • Simulation at user level, role level and profile level
  • Remediation process
  • Mitigation process
  • Creating Control Id
  • Assigning Control Id to Users
  • Assigning Control Id to Roles
  • Assigning Control Id to Profiles
  • Emergency Access Management (EAM)
  • Configuration of EAM component and parameters
  • Managing emergency access
  • Planning emergency access
  • Types of EAM users
  • Creating firefighter, firefighter ID, firefighter controller and firefighter owner
  • Maintaining reason codes
  • Assigning firefighter controller and owner to FFID
  • Assigning FFID to FF
  • Performing Additional Access activities in backend (Business) system by FFID
  • Synchronization of FF logs
  • Checking FF logs
  • Business Role Management (BRM)
  • Configuring Business Role Management
  • Business Role Methodology
  • Creating roles by BRM component
  • Business role definition- technical role definition
  • Role Mass Maintenance
  • Role Mass Import
  • Role Mass Update
  • Role Comparison
  • Role Mining
  • Maintaining role owners/approvers
  • Assigning role owner to role
  • Access Request Management (ARM)
  • Provisioning configuration
  • End User Personalization (EUP)
  • Configuring Approvers and Managers
  • Creating access request
  • Types of access request
  • Creating Template based request
  • Creating Model User
  • Responding to access request by the Approver
  • Comparison with CUP
  • MSMP Workflow and Business Rule Framework
  • MSMP Workflow Introduction
  • Configuring MSMP
  • Perform Automatic Workflow Customizing
  • The concept of BRF+ rule
  • Process ID
  • Initiator rule
  • Agent rule
  • Routing rule
  • Notification and Variable Rule
  • Maintain multistage multipath (MSMP) workflow
  • Standard process id’s
  • Linking BRF+ rule to standard process id
  • Background jobs in GRC AC 10

More than 20000 students on Udemy

  • 4.1 Instructor Rating
  • Best Seller Course
  • Highest Rated Course
  • Courses used by udemy for business clients.

210K students on our platform

  • Unlimited access to all courses.
  • Top Courses for every trending technologies.
  • 4.5 Average ratings for all the courses.
  • Certificate Internationally accepted.

Learn at your pace

Courses Made By Industry Experts

Enhance your career

Enroll NowContact us