Objective
SOC for Cybersecurity Part I
SOC for Cybersecurity Part III
SOC for Cybersecurity Part IV
SOC for Cybersecurity Part V
SOC for Cybersecurity Part VI
SOC for Cybersecurity Part VII
What you will learn:
- SOC evolution
- Learn about SOC 2 audit and who can perform the audit
- Learn how to apply relevant SSAE 18 AICPA Standards
- SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security and SOC for Supply Chain Reports
- Understand scope and use
- Learn about the purpose and relevant standards
- Learn about the subject matter and components of the report
- Understand the use case for SOC for Cyber Security and SOC for Supply Chain
- Learn about SOC 2 + Additional Subject Matter Reports
- Learn the about TSC Mapping to Standards and Frameworks
Advanced Persistent Threat or Intrusion
What you will learn:
|
Anti Money Laundering (AML) Awareness
What you will learn:
- What it is and how does it work?
- Why people and organizations launder money?
- How money laundering works: basic process
- Legal consequences for money laundering, including state and federal (U.S.) penalties
- Applicable laws and regulation
- Insider trading
Architectural Solutions
What you will learn:
|
Asset Management
What you will learn:
|
Backup and Recovery
What you will learn:
|
Breach Management
What you will learn:
What you will learn:
The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:
- What is the importance of abreach notification?
- What is a data breach?
- In what circumstances wouldnotification of a data breach be required and to whom?
- Suggested e-Learning courses toenhance the knowledge.
(Note - The suggested e-Learningprogram is a two-part series.)
Breach Notification Part I - Awareness
What you will learn:
- What is the importance of a breach notification?
- What is a data breach?
- In what circumstances would notification of a data breach be required and to whom?
- When and how should notification of a data breach be provided?
- Framework for Effective Data Breach Notification Legislation
- Timing of Notification to Affected Individuals
- Post Data Breach Immediate Action Items
- Breach Notification to Authorities
Breach Notification Part II - Advanced
What you will learn:
- Breach Management
- Effective Breach Response
- Data Breach Checklist
- Breach Notification Notice Content
- Notification Timelines
- Lifecycle of a Data Breach
- Public Relations Strategy
Bring Your Own Device
What you will learn:
|
Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness
What you will learn:
- Disaster
- Business Continuity and Disaster Recovery
- Use Cases
- Risks Covered by DR
- Driving Factors
- Challenges in Developing DR Plan
- Technical Challenges
- Key Factors in DR Plan