Published 11/2024
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 27h 13m | Size: 14.4 GB
Master SAP S/4HANA Security: Secure Implementations, Fiori Apps, and Cloud Identity Services
What you’ll learn
Understand key security concepts and enhancements specific to SAP S/4HANA compared to SAP ECC.
Analyze the architecture of SAP S/4HANA and address security considerations during migration.
Plan and implement security for greenfield and brownfield S/4HANA projects.
Execute post-installation activities tailored for S/4HANA environments.
Develop SAP Fiori implementation strategies, considering architecture and deployment models.
Design Fiori roles, create custom catalogs and groups, and troubleshoot Fiori applications.
Utilize SAP Business Technology Platform (BTP) for securing cloud deployments.
Implement Cloud Identity Services (CIS) and Identity Access Governance (IAG) in S/4HANA.
Requirements
Familiarity with SAP ERP systems and their functionalities.
Understanding of security concepts specific to SAP ECC.
Experience with SAP Basis administration or SAP security administration
General understanding of IT security principles and practices.
Description
SAP S/4HANA Security is a comprehensive course designed for professionals aiming to master the security aspects of SAP’s advanced ERP solution. This course covers key concepts, implementation strategies, and best practices for securing SAP S/4HANA systems in various business environments.Participants will begin by understanding the security enhancements introduced in S/4HANA compared to SAP ECC, gaining insights into its architecture and migration considerations. The course provides hands-on training in securing both greenfield and brownfield implementations, along with post-installation activities to ensure robust security.A significant focus is placed on SAP Fiori security, teaching participants to design roles, create custom catalogs and groups, and troubleshoot applications within the S/4HANA environment. The course also delves into cloud security, exploring the use of SAP Business Technology Platform (BTP), Cloud Identity Services (CIS), and Identity Access Governance (IAG) to secure hybrid and cloud deployments.This training includes practical labs, real-world scenarios, and expert guidance, enabling participants to confidently manage security for S/4HANA systems. By the end of the course, learners will have the skills to design, implement, and maintain comprehensive security strategies, ensuring compliance, data protection, and system integrity across SAP S/4HANA landscapes.Tailored for SAP security administrators, consultants, and IT security professionals, this course ensures participants are future-ready for evolving business needs.
Who this course is for
Individuals responsible for managing and securing SAP environments.
Professionals handling SAP system administration and technical setups.
Individuals focused on securing IT systems, including enterprise-level applications like SAP.
Consultants involved in implementing and managing technical aspects of SAP systems.
Consultants working on S/4HANA implementations, both greenfield and brownfield.