Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Hi Friends,
I am sudheer from Hyderabad.

i am looking for the training on SAP SECURITY GRC.
KIndly let me know what are the best institute to learn in ameerpet area for this.

Thanking you in advance.

Answer Posted / shiva

Hi Sudheer,My name is Shiva...I had training with real time employee, He have 8yrs of experience on SAP Security GRC Working in level5 MNC. He will show all real time on time. If you are interested call him: +91 99632 16326 his name is Chandrasekhar.

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2453


how we do CUA configuration in Quality system

2443


List the various user types.

1072


what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

1079


What does the profile generator do?

1135


what is authorization object and authorization object class?

1275


Can you explain sap system transactions?

1144


What is the difference between usobx_c and usobt_c?

1088


what are the issues you faced with UME?

3073


explain the personalization tab within a role?

1395


Giving fire call access and extending fire call access by using VIRSA’s VFAT tool.can any one brief this

3705


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2144


When would you update a sap table directly?

1090


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

7185


How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

2258