| Course Others | You are Offering Professional Course | Locality Rajiv Nagar |
SAP GRC Course Training Content
Architecture& features of GRC 10.1
Difference between GRC5.3 & GRC 10.1
Installation steps of GRC10.1
Post installation activities of GRC10.1
Introduction on new components in GRC10.1
ARA (Access Risk Analysis)
Configuring and Maintaining the Rule Set
Analyze and Manage Risk
Maintain a Critical Access Rule
Role Level Simulation
User Level Simulation
Perform Ad Hoc Risk Analysis
Mitigating Risks
EAM (Emergency Access Management)
Emergency Access Management Configuration
Maintain Owners and Controllers in Central Owner Maintenance
Assign Owners to Firefighter IDs
Assign Controllers to Firefighter IDs
Assign Firefighter Users to Firefighter IDs
Maintain Reason Codes
Monitoring Emergency Access
Review a Log Report
ARM (Access Request Management)
Business Rules Framework
Maintaining MSMP Workflow
Customize Workflow
Settings Specific to Provisioning and Managing Users
End User Personalization Forms
Create an Access Request
BRM (Business Role Management)
Configuring Role Management
Roles-Specific Configuration Options
Configuring Role Methodology
Settings for Condition Groups
Maintain Owners for Role Management
Create a Single Role
Mass Managing Roles
Support activities
Risk analysis at user, role level and simulation activities
Mitigation control ids creation and process to mitigate users and roles
Creation of new request in ARM and risk analysis from ARM
Creation of FF ID, FF Owner, FF Controller in EAM.