SOC 2 Compliance Essential Training
Offered By: LinkedIn Learning
Course Description
Overview
Learn what SOC 2 is and how these reports are used to help companies build trust with their customers or prospects.
Syllabus
Introduction
- SOC 2 compliance
- Key SOC 2 terms to know
- Why do companies pursue SOC 2?
- How are SOC 2 reports distributed?
- SOC 3 101 and use cases
- SOC 2+ reports and use cases
- The basics of SOC 2 Type 1
- Understanding SOC 2 Type 2
- Section one: Independent service auditor's report
- Section two: Management's assertion
- Section three: System description
- Section four: Trust Services Criteria and related controls
- Section five: Information not covered in auditor's report
- SOC 2: Trust Services Categories scoping
- The security TSC
- The availability TSC
- The confidentiality TSC
- The processing integrity TSC
- The privacy TSC
- Next steps
Taught by
AJ Yawn
Related Courses
Introduction to Data Analytics for BusinessUniversity of Colorado Boulder via Coursera Digital and the Everyday: from codes to cloud
NPTEL via Swayam Systems and Application Security
(ISC)² via Coursera Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera