File List
-
20_-_Setup_of_SAP_GRC/78_-_SAP_GRC_Segregation_of_Duties_-_Configuration_-_Demo.mp4 70.2 MB
01_-_SAP_Security_Concepts/02_-_User_Master_Record.mp4 20.91 MB
01_-_SAP_Security_Concepts/03_-_SAP_Authorization_Check.mp4 50.37 MB
01_-_SAP_Security_Concepts/04_-_Select_SAP_Authorization_Concept.mp4 26.02 MB
02_-_SAP_User_Maintenance/05_-_User_Types_in_SAP_R_3.mp4 23.43 MB
02_-_SAP_User_Maintenance/06_-_User_Creation_And_Maintenence_In_SAP.mp4 19.18 MB
02_-_SAP_User_Maintenance/07_-_Login_Profile_Parameters_in_SAP.mp4 19.92 MB
03_-_SAP_Role_Concept_Design_and_Maintenance/08_-_Roles_and_Authorizations_in_SAP.mp4 19.62 MB
03_-_SAP_Role_Concept_Design_and_Maintenance/09_-_Parent_and_Derived_Roles_in_SAP.mp4 26.22 MB
03_-_SAP_Role_Concept_Design_and_Maintenance/10_-_Composite_Roles_in_SAP.mp4 21.31 MB
04_-_SAP_ECC_Security/11_-_Organizational_Levels_in_SAP.mp4 21.22 MB
04_-_SAP_ECC_Security/12_-_Authorization_Groups.mp4 52.78 MB
04_-_SAP_ECC_Security/13_-_Security_Tables.mp4 41.86 MB
04_-_SAP_ECC_Security/14_-_Critical_Basis_Authorizations.mp4 29.91 MB
04_-_SAP_ECC_Security/15_-_Custom_Auth_Objects.mp4 29.76 MB
04_-_SAP_ECC_Security/16_-_Default_Users_in_SAP.mp4 20.72 MB
04_-_SAP_ECC_Security/17_-_SAP_Delivered_Checks.mp4 35.59 MB
04_-_SAP_ECC_Security/18_-_SAP_Profile_Reconciliation_-_PFUD.mp4 8.06 MB
05_-_SAP_Security_Reporting/19_-_SAP_User_Information_System.mp4 18.9 MB
06_-_Security_Support_and_Troubleshooting_-_Tips_and_Tricks/20_-_Display_Auth_Data_in_SU53.mp4 35.62 MB
06_-_Security_Support_and_Troubleshooting_-_Tips_and_Tricks/21_-_ST01_Trace_in_Security.mp4 16.72 MB
07_-_SAP_Upgrades/22_-_SU24_Maintain_Check_Indicators.mp4 23.58 MB
07_-_SAP_Upgrades/23_-_Copy_Check_Indicators_-_SU25.mp4 24.1 MB
08_-_SAP_AS_JAVA_Security/24_-_SAP_Portal_Permissions.mp4 21.91 MB
08_-_SAP_AS_JAVA_Security/25_-_UME_SAP_User_Management.mp4 17.18 MB
08_-_SAP_AS_JAVA_Security/26_-_UME_SAP_Roles_Mangement.mp4 11.8 MB
08_-_SAP_AS_JAVA_Security/27_-_SAP_UME_Group_Management.mp4 11.48 MB
09_-_SAP_Business_Objects_Security/28_-_Central_Management_Console_-_CMC.mp4 24.24 MB
09_-_SAP_Business_Objects_Security/29_-_Creating_Users_and_Groups_in_CMC.mp4 27.48 MB
09_-_SAP_Business_Objects_Security/30_-_Access_Levels_in_SAP_BOE.mp4 19.95 MB
10_-_SAP_Technical_Know_how_to_Manage_SAP_Security/31_-_SAP_Central_User_Administration_-_CUA.mp4 28.9 MB
10_-_SAP_Technical_Know_how_to_Manage_SAP_Security/32_-_SE93_-_SAP_Custom_T_Code_Creation.mp4 12.89 MB
10_-_SAP_Technical_Know_how_to_Manage_SAP_Security/33_-_SU10_-_Mass_User_Maintenance_in_SAP_R_3.mp4 12.45 MB
11_-_Introduction_to_SAP_GRC/34_-_SAP_GRC_Overview.mp4 31.63 MB
11_-_Introduction_to_SAP_GRC/35_-_Why_do_you_need_SAP_GRC_.mp4 17.77 MB
11_-_Introduction_to_SAP_GRC/36_-_SAP_GRC_10_-_what_is_new_.mp4 68.01 MB
11_-_Introduction_to_SAP_GRC/37_-_SAP_GRC_version_history.mp4 14.93 MB
11_-_Introduction_to_SAP_GRC/38_-_Terminology_used_in_SAP_GRC_10.mp4 41.53 MB
11_-_Introduction_to_SAP_GRC/39_-_SAP_GRC_Product_Components.mp4 24.74 MB
11_-_Introduction_to_SAP_GRC/40_-_Product_Availability_Matrix_for_SAP_GRC.mp4 20.07 MB
11_-_Introduction_to_SAP_GRC/41_-_SAP_GRC_-_Products_and_Vendors.mp4 13 MB
11_-_Introduction_to_SAP_GRC/42_-_Sizing_for_SAP_GRC.mp4 15.62 MB
12_-_Fundamentals_of_GRC/43_-_Sarbanes-Oxley_Act_SOX_.mp4 28.42 MB
12_-_Fundamentals_of_GRC/44_-_Segregation_of_Duties_-_SoD.mp4 24.55 MB
12_-_Fundamentals_of_GRC/45_-_SAP_Authorization_concept.mp4 25.2 MB
13_-_Concepts_in_SAP_GRC/46_-_What_is_Risk_.mp4 27.45 MB
13_-_Concepts_in_SAP_GRC/47_-_What_is_Rule_Set.mp4 36.94 MB
13_-_Concepts_in_SAP_GRC/48_-_Role_Matrix.mp4 29.11 MB
13_-_Concepts_in_SAP_GRC/49_-_Security_Design_for_SAP_GRC.mp4 25.81 MB
13_-_Concepts_in_SAP_GRC/50_-_Organizational_Rules.mp4 20.96 MB
14_-_Architecture_and_Infrastructure_for_SAP_GRC/51_-_Architecture_of_SAP_GRC.mp4 26.66 MB
14_-_Architecture_and_Infrastructure_for_SAP_GRC/52_-_Landscape_Options_and_Deployment_of_SAP_GRC.mp4 34.44 MB
14_-_Architecture_and_Infrastructure_for_SAP_GRC/53_-_SAP_GTS_10.0_-_Architecture.mp4 11.52 MB
15_-_Major_Components_of_SAP_GRC/54_-_SAP_GRC_Access_Control_Suite.mp4 28.16 MB
15_-_Major_Components_of_SAP_GRC/55_-_SAP_GRC_Process_Control_-_PC.mp4 38.57 MB
15_-_Major_Components_of_SAP_GRC/56_-_SAP_GRC_Global_Trade_Services.mp4 30.06 MB
15_-_Major_Components_of_SAP_GRC/57_-_SAP_GRC_EH_and_S.mp4 16.6 MB
15_-_Major_Components_of_SAP_GRC/58_-_SAP_GRC_Nota_Fiscal_Electronica.mp4 8.85 MB
16_-_SAP_GRC_Access_Risk_Analysis_-_ARA/59_-_SAP_GRC_ARA_-_An_overview.mp4 12.57 MB
16_-_SAP_GRC_Access_Risk_Analysis_-_ARA/60_-_Demo_-_SAP_GRC_ARA.mp4 22.06 MB
17_-_SAP_GRC_ARM_-_Access_Request_Management/62_-_SAP_GRC_ARM_-_An_overview.mp4 19.43 MB
17_-_SAP_GRC_ARM_-_Access_Request_Management/63_-_Demo_-_SAP_GRC_ARM_Configuration.mp4 30.8 MB
18_-_SAP_GRC_BRM_-_Business_Role_Management/65_-_SAP_GRC_BRM_-_An_overview.mp4 15.41 MB
18_-_SAP_GRC_BRM_-_Business_Role_Management/66_-_Demo_-_SAP_GRC_BRM.mp4 26.72 MB
19_-_SAP_GRC_EAM_-_Emergency_Access_Management/68_-_SAP_GRC_EAM_-_An_overview.mp4 16.53 MB
19_-_SAP_GRC_EAM_-_Emergency_Access_Management/69_-_Demo_-_SAP_GRC_EAM_configuration.mp4 33.57 MB
20_-_Setup_of_SAP_GRC/71_-_Download_GRC_from_SAP_Marketplace.mp4 38.08 MB
20_-_Setup_of_SAP_GRC/72_-_Installation_of_SAP_GRC_10.mp4 15.44 MB
20_-_Setup_of_SAP_GRC/73_-_Installation_of_SAP_GTS_10.0.mp4 9.14 MB
20_-_Setup_of_SAP_GRC/74_-_SAP_GRC_Risk_Terminator.mp4 16.03 MB
20_-_Setup_of_SAP_GRC/75_-_Integration_of_SAP_GRC_AC_with_SAP_Identity_Management.mp4 15.83 MB
20_-_Setup_of_SAP_GRC/76_-_List_of_Supported_SAP_GRC_Control_Applications.mp4 9.61 MB
20_-_Setup_of_SAP_GRC/77_-_T-Codes_used_in_SAP_GRC_10.mp4 13.64 MB
01_-_SAP_Security_Concepts/01_-_Introduction_to_SAP_Security.mp4 18.54 MB
20_-_Setup_of_SAP_GRC/79_-_SAP_GRC_Rule_Set_Maintenance.mp4 8.55 MB
20_-_Setup_of_SAP_GRC/80_-_SAP_GRC_Mitigation_Controls.mp4 9.8 MB
21_-_Conclusion/81_-_Conclusion.mp4 6.25 MB
Download Info
-
Tips
“SAP Audit” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.