LIVE Training & LIVE Project Oracle GRC

  • Introduction to the Oracle Governance, Risk and Compliance Controls Suite
    1. Oracle Governance, Risk and Compliance Controls Suite Overview

 

  • Application Access Controls Governor Overview
    1. Overview of Setting Up AACG
    2. Implementation Considerations
    3. Setting up Application Access Controls Governor
    4. Application Access Controls Governor Setup Flowchart
    5. Setup Checklist
    6. Application Access Controls Governor Setup Steps

 

  • AACG Configuration Planning and Installation
    1. Defining Data Sources
    2. Defining Roles
    3. Defining Users
    4. Defining Notification Schedules
    5. ETL Synchronization

 

  • AACG Policy Planning and Setup
    1. Defining Entitlements
    2. Defining Policies
    3. Defining Conditions

 

  • AACG Reporting
    1. Using and Running Reports
    2. Accessing the Report Center
    3. Viewing Reports

 

  • AACG Remediation
    1. Overview of Remediation
    2. Remediation Considerations
    3. Remediation Flowchart
    4. Remediation Checklist
    5. Application Access Control Governor Remediation Steps
    6. Using the Heat Map
    7. Using Work Queue Management
    8. Running Conflict Reports

 

  • Transaction Controls Governor Overview
    1. TCG Application Overview
    2. GRCC 8.5 Platform Review and TCG Differentiators
    3. Using Business Objects
    4. TCG Setup
    5. Creating Filters and Using Business Objects
    6. Using Processes by Functional Area

 

  • TCG Configuration Planning and Installation
    1. Configuration Planning
    2. Defining Datasources
    3. Defining Roles and Users
    4. Using ETL Synchronization
    5. Synchronizing Data
    6. Accessing Job History
      1. Using Administration to set Data Administration
      2. Application Configuration
      3. Business Object Administration

 

  • Using the Manage Model Page
    1. Viewing Models
    2. Synchronizing Data
    3. Viewing or Exporting Results
    4. Creating, Editing, Copying, or Deleting Models
    5. Exporting Models or Templates
    6. Importing Models or Templates

 

  • TCG Create and Edit Models
    1. Using the Create Model Page
    2. Selecting Business Objects
    3. Using Custom Objects
    4. Selecting Datasources
    5. Selecting and Arranging Filters, Functions, and Patterns
    6. Creating a Filter, a Function, and a Pattern
    7. Defining Model Results
    8. Saving Models

 

  • Preventive Controls Governor Overview
    1. Preventive Controls Governor Application Overview
    2. Identifying the Components of PCG

 

  • PCG Form Rules
    1. Setting Security with the Event Tracker
    2. Creating Messages
    3. Default Value Rule
    4. List of Values Rule

 

  • PCG Flow Rules
    1. Trigger-Based and Periodic Process Rules
    2. Constraint Process Flows
    3. Approval and Notification Process Flows
    4. Concurrent Request Process Flows
    5. SQL Process Flows
    6. Condition Process Flows

 

  • PCG Audit Rules
    1. Creating Audit Groups
    2. Defining Audit Columns and Translation Data
    3. Reporting
    4. The Online Audit Form

 

  • PCG Change Control Rules
    1. Approval Change Control Rules
    2. Creating Change Control Rules Manually
    3. Loading Change Control Rules Content

 

  • Configuration Controls Governor Overview
    1. Describe the components that comprise Configuration Controls Governor
    2. CCG Setup Overview
    3. CCG Functionality
    4. Snapshots and Comparisons
    5. Change Tracking
    6. Unique Identifiers and Primary Keys
    7. CCG Roles

 

  • CCG Snapshots and Comparisons
    1. Snapshot Definitions
    2. Snapshot Occurrences
    3. Snapshot Occurrence Reports
    4. Record Comparisons

 

  • CCG Change Tracking
    1. Change Tracking Reports
    2. Change Tracking Definitions
    3. Change Tracking Status Reports
    4. Change Tracking Data
    5. Change Tracking Queries and Alerts
    6. Change Tracking Alert Recipients

 

  • Additional CCG Activities
    1. Scheduling Snapshots
    2. Performing Forced Comparisons
    3. Creating Templates
    4. Purging Change Tracking Data
    5. Defining Security Groups and Users