https://investasi.pasamankab.go.id/https://investasi.pasamankab.go.id/bo/https://investasi.pasamankab.go.id/ran/https://www.tiendacapilar.com/https://www.carreirosdomonte.com/https://doglongevity.vet/https://rapamycinforcats.com/https://www.restaurantecentralgrill.com/https://investasi.pasamankab.go.id/sg/https://investasi.pasamankab.go.id/static/
SAP-GRC Course in Hyderabad -SV Infotech -Trainwick

Course Detail

SAP-GRC Course

SAP-GRC Course - SV Infotech


Course Detail


Course Description

1.GRC 10.0 COURSE CONTENTS

 

2.Overview of SOX

 

3.Overview of SOD

 

4.Introduction to GRC 10.0

 

4,1.Difference between GRC 5.3 and GRC 10.0

4.2.Difference between GRC 5.3 and GRC 10.0

4.3.Overview of different application in GRC 10.0

4.4.Introduction to different components of GRC AC

 

5.Installation of GRC 10.0

 

5.1.Prerequisites of GRC 10.0 installation

5.2.Post Installation activities of GRC 10.0

5.3.Configuration settings of GRC 10.0

 

6.Access Control 10.0 Architecture

 

7.GRC 10.0 security and authorizations

 

7.1.Object level security

7.2.Authorization requirements

7.3.Access Control delivered role

7.4.Shared configuration settings

7.5.Configure the Integration framework

7.6.Configure shared access control settings

7.7.Identify Business Configuration (BC) sets

 

8.Access Risk Analysis (ARA)

 

8.1.Creating Rule set

8.2.Creating Business Process

8.3.Creating Risk

8.4.Creating Function

8.5.Risk analysis at user level

8.6.Risk analysis at role level

8.7.Mitigation process

8.8.Remediation process

8.9.Simulation

8.10.Creating Control Id

8.11.Assigning Control Id to Users

8.12.Assigning Control Id to Roles

 

9.Emergency Access Management (EAM)

 

9.1.Managing emergency access

9.2.Planning emergency access

9.3.Types of EAM users

9.4.Creating firefighter, firefighter ID, firefighter controller and firefighter owner

9.5. Maintaining reason codes

9.6. Assigning firefighter controller and owner to FFID

9.7. Assigning FFID to FF

9.8.Checking FF logs

  

10.Business Role Management (BRM)

 

10.1.Post installation activities of BRM

10.2.Creating a role by BRM component

10.3.Business role definition- technical role definition

10.4.Creating single role

10.5.Creating composite role

10.6.Creating Business role

10.7.Maintaining role owners/approvers

10.8.Assigning role owner to role

 

11.Access Request Management (ARM)

 

11.1.Creating access request

11.2.Types of access request

11.3.Responding to access request

11.4.Designing end user personalization form

11.5.Comparison with CUP

 

12.MSMP Workflow and Business Rule Framework

 

12.1.The concept of BRF+ rule\

12.2.Process ID

12.3.Initiator rule

12.4.Agent rule

12.5.Routing rule

12.6.Creating BRF + rule

12.7.Maintain multistage multipath (MSMP) workflow

12.8.Standard process id’s

12.9.Linking BRF+ rule to standard process id

12.10.Background jobs in GRC AC 10.0

Institute Overview

Hyderabad, Telangana, India

SV InfoTech is committed to provide consistent quality education and training to students in the arena of the Information technology / ITE’s particularly in Emerging Technologies. It manages complexities with unparalleled insight, innovative st... Read More

Related Courses

Google Map