Course Details
Day wise Coverage | Topics |
---|---|
Day1 | GRC Access Control Architecture
|
Day2 | Post Installation Steps – Pre Checks |
Day3 | Connector Configuration – ABAP & JAVA Stacks |
Day4 | Connector Configuration |
Day5 | Sync Jobs |
Day6 | Access Risk Analysis – Introduction |
Day7 | SOD Risk – Action Level & Permission Level |
Day8 | Critical Action Risk |
Day9 | Critical Permission Risk |
Day10 | Risk Analysis Formats, Types, Levels |
Day11 | Risk Simulation at User Level & Role Level
|
Day12 | Risk Remediation |
Day13 | Risk Mitigation – Mitigation Controls, Org and Owners |
Day14 | Offline & Online Risk Analysis |
Day15 | SOD Rules upload & Donwload |
Day16 | EAM Configuartion |
Day17 | EAM Support – FF ID Creation, FF ID Assignment |
Day18 | Difference between ID based & Role based FF |
Day19 | Difference between Centralized & Decentralized FF Concepts |
Day20 | BRM – Introduction |
Day21 | Methodolgy Process and Steps,
|
Day22 | Role Import Concept |
Day23 | Business Role Concept, Role Mining & Role Reaffirm |
Day24 | ARM – Introdution |
Day25 | User Provisioning Configuration – Request Types, Number Ranges |
Day26 | User Provisioning Configuration – Provisoning Settings |
Day27 | MSMP Workflow Configuration – Process IDs, Rules, Paths |
Day28 | MSMP Workflow Configuration – Customizing Agent Rules, |
Day29 | Customizing Initiator Rule using BRF+ Application |
Day30 | Workflow Testing, Troubleshooting Workflow issues |
Day31 | Extra Topics |
Empowering individuals and businesses with expert IT training and consulting solutions for a smarter, secure future.
Copyright © 2024 ASK Project