Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

SOC 2 Compliance Essential Training

Description

Learn what SOC 2 is and how these reports are used to help companies build trust with their customers or prospects.

Tags

Syllabus

Introduction
  • SOC 2 compliance
1. SOC 2 Overview
  • Key SOC 2 terms to know
  • Why do companies pursue SOC 2?
  • How are SOC 2 reports distributed?
2. SOC 2 Report Types
  • SOC 3 101 and use cases
  • SOC 2+ reports and use cases
  • The basics of SOC 2 Type 1
  • Understanding SOC 2 Type 2
3. Sections of a SOC 2 Report
  • Section one: Independent service auditor's report
  • Section two: Management's assertion
  • Section three: System description
  • Section four: Trust Services Criteria and related controls
  • Section five: Information not covered in auditor's report
4. Trust Services Categories (TSCs)
  • SOC 2: Trust Services Categories scoping
  • The security TSC
  • The availability TSC
  • The confidentiality TSC
  • The processing integrity TSC
  • The privacy TSC
Conclusion
  • Next steps

Online Course


SOC 2 Compliance Essential Training

Affiliate notice

Learn what SOC 2 is and how these reports are used to help companies build trust with their customers or prospects.

Introduction
  • SOC 2 compliance
1. SOC 2 Overview
  • Key SOC 2 terms to know
  • Why do companies pursue SOC 2?
  • How are SOC 2 reports distributed?
2. SOC 2 Report Types
  • SOC 3 101 and use cases
  • SOC 2+ reports and use cases
  • The basics of SOC 2 Type 1
  • Understanding SOC 2 Type 2
3. Sections of a SOC 2 Report
  • Section one: Independent service auditor's report
  • Section two: Management's assertion
  • Section three: System description
  • Section four: Trust Services Criteria and related controls
  • Section five: Information not covered in auditor's report
4. Trust Services Categories (TSCs)
  • SOC 2: Trust Services Categories scoping
  • The security TSC
  • The availability TSC
  • The confidentiality TSC
  • The processing integrity TSC
  • The privacy TSC
Conclusion
  • Next steps