Autoplay
Autocomplete
Previous Lesson
Complete and Continue
SAP S/4HANA Security Training
Session 1 - Overview of SAP S/4HANA
Session Video - Overview of SAP S/4HANA (70:25)
Assessment - Overview of SAP S/4HANA
Assignment - Overview of SAP S4HANA
Lab Activity - Setting Up Your First SAP S4HANA System Installation and Configuration
Session 2 - Key Security Concepts and Principles
Session Video - Key Security Concepts and Principles (69:42)
Assessment - Key Security Concepts and Principles
Assignment - Key Security Concepts and Principles
Lab Activity - Configuring User Authentication and Authorization Settings
Session 3 - Comparison and Enhancements compared to ECC
Session Video - Comparison and Enhancements compared to ECC (78:16)
Assessment - Comparison and Enhancements compared to ECC
Assignment - Comparison and Enhancements compared to ECC
Lab Activity - Migrating Security Roles from ECC to S4HANA
Session 4 - Architecture of SAP S/4 HANA
Session Video - Architecture of SAP S/4 HANA (75:45)
Assessment - Architecture of SAP S4HANA
Assignment - Architecture of SAP S4 HANA
Lab Activity - Mapping Out the Components of SAP S4HANA Architecture
Session 5 - Architecture of SAP S/4 HANA & SAP Fiori Overview
Session Video - Architecture of SAP S/4 HANA & SAP Fiori Overview (73:59)
Assessment - Architecture of SAP S4 HANA & SAP Fiori Overview
Assignment - Architecture of SAP S4 HANA & SAP Fiori Overview
Lab Activity - Implementing Security Measures for Fiori Applications on S4HANA
Session 6 - Security Considerations for Migration from ECC to S/4 HANA and Fiori Security Overview
Session Video - Security Considerations for Migration from ECC to S/4 HANA and Fiori Security Overview - Part 1 (71:34)
Session Video - Security Considerations for Migration from ECC to S/4 HANA and Fiori Security Overview - Part 2 (71:37)
Assessment - Security Considerations for Migration from ECC to S4HANA and Fiori Security Overview
Assignment - Security Considerations for Migration from ECC to S4HANA and Fiori Security Overview
Lab Activity - Assessing and Mitigating Risks During Migration
Session 7 - SAP Rise and SAP Activate Methodologies & Fiori Security Overview
Session Video - SAP Rise and SAP Activate Methodologies & Fiori Security Overview (80:36)
Assessment - SAP Rise and SAP Activate Methodologies & Fiori Security
Assignment - SAP Rise and SAP Activate Methodologies & Fiori Security
Lab Activity - Fiori Security in RISE Implementations Configurations and Controls
Session 8 - Greenfield Implementation & Fiori Security Services
Session Video - Greenfield Implementation & Fiori Security Services - Part 1 (69:46)
Session Video - Greenfield Implementation & Fiori Security Services - Part 2 (99:29)
Session Video - Greenfield Implementation & Fiori Security Services - Part 3 (84:11)
Session Video - Greenfield Implementation & Fiori Security Services - Part 4 (54:17)
Session Video - Fiori Security Services - Part 5 (62:31)
Session Video - Fiori Security Services - Part 6 (67:08)
Session Video - Fiori Security Services - Part 7 (63:21)
Session Video - Fiori Security Services - Part 8 (74:54)
Session Video - Fiori Security Services - Part 9 (62:07)
Session Video - Fiori Security Services - Part 10 (56:49)
Session Video - Fiori Security Services - Part 11 (56:00)
Session Video - Fiori Security Services - Part 12 (59:28)
Session Video - Version Compatibility and Post Installation Activity and SU25 (81:39)
Session Video - Fiori Security Services - Part 13 (61:34)
Assessment - Greenfield Implementation & Fiori Security Services
Assignment - Greenfield Implementation & Fiori Security Services
Lab Activity - Leveraging Fiori Security Services in New Implementations
Session 9 - BTP Security, CIS and IAG Overview
Session Video - BTP Security, CIS and IAG Overview (88:05)
Assessment - BTP Security, CIS and IAG Overview
Assignment - BTP Security, CIS and IAG Overview
Lab Activity - Implementing Identity Access Governance (IAG) in SAP Environments
Assesments
Assessment - Introduction to SAP S4HANA Security
Assessment - SAP S4HANA Landscape Security
Assessment - User and Role Administration
Assessment - Authentication and Single Sign-On (SSO)
Assessment - Data Protection and Encryption
Assessment - Auditing and Monitoring
Assessment - SAP Fiori Security
Assessment - Advanced Threat Protection
Assessment - Security Patching and Updates
Assessment - Disaster Recovery and Business Continuity
Assessment - SAP S4HANA Cloud Security
Assignments
Assignment - Introduction to SAP S4HANA Security
Assignment - SAP S4HANA Landscape Security
Assignment - User and Role Administration
Assignment - Authentication and Single Sign-On (SSO)
Assignment - Data Protection and Encryption
Assignment - Auditing and Monitoring
Assignment - SAP Fiori Security
Assignment - Advanced Threat Protection
Assignment - Security Patching and Updates
Assignment - Disaster Recovery and Business Continuity
Assignment - SAP S4HANA Cloud Security
Lab Activities
Lab Activity - Create SAP Fiori Catalogs
Lab Activity - Access the Training System Landscape
Lab Activity - Create SAP Fiori Groups
Lab Activity - Create a Front-End Server (FES) Role
Additional materials shared by Instructor
Reference Document - Fiori Troubleshooting T Codes
Reference Document - Green Field Best Fit
Reference Document - Greenfield Implementation Detailed steps
Reference Document - SAP Activate Methodology
Reference Document - Solution_UseCase_1
Reference Document - Spaces & Pages
Reference Document - Steps for Fiori Application addition
Reference Document - SU25_Document
Reference Document - Tables for S4HANA and FIORI
Reference Document - Use Case 1 Segregating Access Between Departments
Capstone Projects / Case Studies
Capstone Project - Design and Implementation of Comprehensive User Access Controls for a Manufacturing Company
Capstone Project - Implementation of Automated Access Reviews and Firefighter Access Management
Capstone Project - Secure Configuration and Vulnerability Assessment of an SAP ECC System
Capstone Project - Enabling Smart Manufacturing with SAP Public Cloud
Interview Q&As
Set 1 - Interview Q&As
Set 2 - Interview Q&As
Set 3 - Interview Q&As
Quiz
Test Your Knowledge
Prepare your Linkedin profile
Linkedin Cheat Sheet
Prepare your Resume
Resume Cheat Sheet
Teach online with
Assignment - Advanced Threat Protection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock