Hyperion Planning Training
Hyperion Planning online training Course Content
Introduction to Hyperion
Introduction to Hyperion Planning
Hyperion Planning Architecture
RDBMS/Planning/Essbase
Hyperion Essbase Terminology
Navigating the Planning Web Client
Hyperion Workspace
2.Planning Dimensions and Data Storage Overview
Planning Dimensions Overview
Required Dimensions
User-Defined Dimensions
Dense Dimensions
Sparse Dimensions
Data Block Creation Process
Selecting Aggregation, Data Storage, And Calculation Options
Classic Planning Application Creation
Pre-requisites to create Hyperion Planning Application
Oracle Schema Creation
Data Source Creation
Year and Timeperiod Setting
Currency Settings
Defining Plan Types
EPMA Planning Application Creation
Pre-requisites to create Hyperion Planning Application
Oracle Schema Creation
Data Source Creation
Dimension Library Creation Process
Year and Time period Settings
Currency Settings
Defining Plan Types
Metadata building in Classic Planning Application
Metadata Creation Process
Manual Process (for learning purpose)
Loading Metadata into Planning Application using outline load utility
Metadata building in EPMA Planning Application
Metadata Creation Process
Manual Process (for learning purpose)
Loading Metadata into EPMA Planning Application using .ads flat files
5. Creating and Managing Web Forms
Creation of Simple Web Forms
Creation of Composite Web Forms
Creation of Web Form Folder Structure
Assigning BR to the Web Forms
Security on Web Forms
Security on Web Forms Folder Structure
Entering Data using Web Forms
Entering Data uisng Smart View
7.Creating Business Rules
Overview on Business Rules
Business Rules Creation Process
Using Run-Time Prompts in Business Rules
Defining Access Privileges to Business Rules
8. Creation of Smart Lists
Smart List Creation
9.Creation of Task Lists
Creation of Task Lists
Defining Access Privileges to Task Lists
10.Process Management Overview
Work Flow
11.Security Implementation
Hyperion Shared Services
Creation of Users
Creation of Groups
Assigning users to groups
Giving Access to Planning Application
Giving Security on Dimension Members
Giving Security on Business Rules
Giving Security on Task Lists
Real time scenarios
Complexities faced in the implementation
Support Tickets or Real time Errors
Questionnaire
CV Preparation