Trust Service Criteria encompass security and privacy controls integral in the protection of our business and personal data. The criteria is comprised of tactics such as utilizing multifactor authentication, encrypting connections, databases, and laptops, and backing up servers, configurations, and data. In this course, you will learn about policies, procedures, and cyber security controls entities should implement to protect corporate assets, company trade secrets, customer and employee identity, and financial information.
This course introduces you to a variety of controls you can implement to protect your organization’s assets, brand, and image. We will delve into understanding the principles behind Trust Service Criteria for security, availability, processing integrity, confidentiality, and privacy. Lastly, we will discuss simple controls that can be implemented, critical monitoring that should be performed, and important employee training that needs to occur.
Course Key Concepts: Trust Service Criteria, SOC2, Cybersecurity, IT Audit, NIST, SSAE.
Learning Objectives
- Explore the Trust Service Criteria.
- Identify key security, availability, processing integrity, confidentiality and privacy controls.
- Discover and discuss methodologies for developing and implementing entity wide policies.
- Discover practices to ensure Trust Service Criteria compliance.
4 Reviews (28 ratings)
Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.