| Topic | Details |
| Topic 1 | - Set Up Import Tables:This section of the exam assesses the ability of Compensation Analysts to configure and import required compensation-related tables. It includes loading lookup tables and data required for business rules and logic.
|
| Topic 2 | - Managing Employee Specific Data:This section of the exam assesses the skills of SAP Consultants in handling employee-specific data used in compensation planning. It includes importing and mapping fields like pay, performance, and custom metrics.
|
| Topic 3 | - Plan Settings: This section of the exam measures the skills of SAP Consultants in defining plan-level configurations. It includes cycle setup, planner eligibility, planner hierarchy, and general settings required to operationalize compensation plans.
|
| Topic 4 | - Implementation Test: This section of the exam evaluates the understanding of Compensation Analysts in verifying system configuration using implementation test tools. It includes basic validation and troubleshooting before plan launch.
|
| Topic 5 | - Reports and Workflows: This section of the exam evaluates the proficiency of SAP Consultants in setting up reports and approval workflows. It covers route maps, executive reviews, and standard reporting capabilities.
|
| Topic 6 | - Compensation Statements: This section of the exam assesses the ability of SAP Consultants to configure and generate employee-facing compensation statements. It includes statement templates, design options, and output settings to ensure clear communication of compensation results.
|
| Topic 7 | - Compensation Worksheets: This section of the exam evaluates the knowledge of Compensation Analysts in managing compensation worksheets. It involves planning templates, columns, formulas, and worksheet behavior needed to support merit, bonus, and stock processes.
|
| Topic 8 | - Permissions:This section of the exam measures the knowledge of Compensation Analysts in managing role-based permissions for compensation planners and administrators. It includes securing access to forms, fields, and processes.
|