You are on page 1of 7

SAP NetWeaver Application Server Fundamentals SAPTEC Content

o o o o o o o o o o o o o o o o o

The Big Picture Outlining the SAP portfolio Explaining the key capabilities of SAP NetWeaver Describing SAP's Release Strategy Navigation Navigating in SAP Systems Performing Advanced Navigation in the SAP GUI Applying help options and personalize user interface The System Core Analyzing SAP NetWeaver AS system architecture Explaining AS ABAP Request Processing Explaining AS ABAP Transactional Processing Explaining AS Java Processes for SAP NetWeaver 7.0x and lower Explaining AS Java Processes for 7.3 EHP1 Software Development in SAP Systems Outlining the Data Structure of an SAP ABAP System Outlining Software Logistics in ABAP environment Describing the most important ABAP Workbench tools Implementing an ABAP program Outlining SAP NetWeaver Development Infrastructure Software Lifecycle Management Outlining Application Lifecycle Management

o o o o o o o o o

Implementing and Installing SAP Systems Maintaining SAP Systems Communication and Integration Technologies Remote Function Calls and BAPIs Linking Cross-System Business Processes Describing the Basics of Web Services Outlining the Service-Oriented Architecture (SOA) SAP System Administration Outlining daily Tasks in System Management Consulting SAP Service Marketplace Consulting SAP Community Network

ABAP AS Authorization Concept ADM 940

Content
o o o o o o o o o o o o o o o o o

Authorizations Working with Authorizations Authorization Concepts for Compliant Identity Management Working with Identity Management (IDM) Working with Governance, Risk and Compliance (GRC) Working with Compliant Identity Management (CIM) Designing an Authorization Concept for an AS ABAP based system Implementing an Authorization Concept for an AS ABAP based system Authorization Terminology Working with the Elements and Terms of an Authorization concept Checking authorization in an ABAP systems User Maintenance Working with different User sources Maintaining User Basic Role Maintenance Defining a role Defining authorizations in a role Defining customizing roles Creating composite roles Creating reference and derived roles Advanced Role Maintenance Using subtleties of the authorization maintenance Defining authorizations for system user Configure authorization environment

o o o o o o o o

Installing and Upgrade the role maintenance Configuring the role maintenance Defining system settings Analyzing authorization Transporting authorizations Integration into the Company Landscape Using the Central User Administration (CUA) Moving CUA into IDM Knowing other Topics of authorization concepts in the SAP Business Suite

Secure SAP System Management

ADM 950

Content
o o o o o o o o o o o o o o

Introduction to Internal Security Auditing Getting overview about security auditing Customize and Usage of AIS Configuring the AIS Using the AIS Users and Authorizations Audit Customizing the Role Maintenance Tools in SAP Solutions Securing User and Group Administration Securing Critical Authorization Securing the System by Login-Related Parameters System Audit Configuring and Using the Security Audit Log Securing System Administration Services Repository and Table Audit Using Logs to Monitor the Application Security in Change Management Securing Change Management Security Assessment Using SAP Security Optimization Self Service Using of SAP Security Notes Implementing and checking technical security recommendation

ADM 960 Content


Computer Security Overview Analyzing Security Threats Evaluating the SAP System Environment

Network Basics

Describing the Basics of Networks Determining the Key Points of Network Security Installing and Configuring SAP Router Installing and Configuring SAP Web Dispatcher

Basic Security for SAP Systems


Securing the Front End Setting Up User Security in SAP Systems Defining Authorizations in SAP Systems Setting Up Interface Security in SAP Systems Providing Development Protection and Applying Security Patches Monitoring SAP Systems Monitoring and Analyzing Security with SAP Solution Manager

Introduction to Cryptography

Evaluating Cryptography for Security Evaluating Authentication and Digital Signatures for Security Applying Cryptography in SAP Systems

Secure Network Communication


Setting up Secure Network Communication (SNC)

Secure Socket Layer


Enabling Secure Socket Layer with SAP NetWeaver AS Enabling SSL on the SAP NetWeaver AS ABAP Enabling SSL on the SAP NetWeaver AS Java Enabling SSL on SAP Web Dispatcher and Microsoft Management Console

Authentication and Single Sign-On mechanisms in SAP Systems


Evaluating SAP System Authentications Enabling Session Security Using SSO

You might also like