Day wise Coverage | Topics |
Day 1 | GRC Access Control Architecture |
Day 2 | Post Installation Steps – Pre Checks |
Day 3 | Connector Configuration – ABAP JAVA Stacks |
Day 4 | Connector Configuration |
Day 5 | Sync Jobs |
Day 6 | Access Risk Analysis – Introduction |
Day 7 | SOD Risk – Action Level Permission Level |
Day 8 | Critical Action Risk |
Day 9 | Critical Permission Risk |
Day 10 | Risk Analysis Formats, Types, Levels |
Day 11 | Risk Simulation |
Day 12 | Risk Remediation |
Day 13 | Risk Mitigation |
Day 14 | Offline Online Risk Analysis |
Day 15 | SOD Rules upload Download |
Day 16 | EAM Configuration |
Day 17 | EAM Support – FF ID Creation, FF ID Assignment |
Day 18 | Difference between ID based Role based FF |
Day 19 | Difference between Centralized Decentralized FF Concepts |
Day 20 | BRM – Introduction |
Day 21 | Methodology Process and Steps, Role Imports |
Day 22 | Business Role Concept |
Day 23 | ARM – Introduction |
Day 24 | User Provisioning Configuration – Request Types, Number Ranges |
Day 25 | User Provisioning Configuration – Provisioning Settings |
Day 26 | MSMP Workflow Configuration – Process IDs, Rules, Paths |
Day 27 | MSMP Workflow Configuration – Customizing Agent Rules, |
Day 28 | Customizing Initiator Rule using BRF + Application |
Day 29 | Workflow Testing, Troubleshooting Workflow issues |
Day 30 | Extra Topics |
You should have SAP security experience or knowledge.