YoVDO

SOC 2 Compliance Essential Training

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses IT Compliance Courses Data Privacy Courses System Security Courses

Course Description

Overview

Learn what SOC 2 is and how these reports are used to help companies build trust with their customers or prospects.

Syllabus

Introduction
  • SOC 2 compliance
1. SOC 2 Overview
  • Key SOC 2 terms to know
  • Why do companies pursue SOC 2?
  • How are SOC 2 reports distributed?
2. SOC 2 Report Types
  • SOC 3 101 and use cases
  • SOC 2+ reports and use cases
  • The basics of SOC 2 Type 1
  • Understanding SOC 2 Type 2
3. Sections of a SOC 2 Report
  • Section one: Independent service auditor's report
  • Section two: Management's assertion
  • Section three: System description
  • Section four: Trust Services Criteria and related controls
  • Section five: Information not covered in auditor's report
4. Trust Services Categories (TSCs)
  • SOC 2: Trust Services Categories scoping
  • The security TSC
  • The availability TSC
  • The confidentiality TSC
  • The processing integrity TSC
  • The privacy TSC
Conclusion
  • Next steps

Taught by

AJ Yawn

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network