SOC 2 Compliance Essential Training
Offered By: LinkedIn Learning
Course Description
Overview
Learn what SOC 2 is and how these reports are used to help companies build trust with their customers or prospects.
Syllabus
Introduction
- SOC 2 compliance
- Key SOC 2 terms to know
- Why do companies pursue SOC 2?
- How are SOC 2 reports distributed?
- SOC 3 101 and use cases
- SOC 2+ reports and use cases
- The basics of SOC 2 Type 1
- Understanding SOC 2 Type 2
- Section one: Independent service auditor's report
- Section two: Management's assertion
- Section three: System description
- Section four: Trust Services Criteria and related controls
- Section five: Information not covered in auditor's report
- SOC 2: Trust Services Categories scoping
- The security TSC
- The availability TSC
- The confidentiality TSC
- The processing integrity TSC
- The privacy TSC
- Next steps
Taught by
AJ Yawn
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network