Framework - SOC 2 Compliance Course
Total duration:
11 h 57 min
Episode 1 — What SOC 2 Is (and Isn’t)
Framework - SOC 2 Compliance Course
19:43
Episode 2 — Do You Need SOC 2 Now? Buyer & Contract Signals
Framework - SOC 2 Compliance Course
19:08
Episode 3 — Scoping: System Boundary, Services, Regions, Tenants
Framework - SOC 2 Compliance Course
17:55
Episode 4 — Trust Services Criteria at a Glance
Framework - SOC 2 Compliance Course
18:55
Episode 5 — Control Ownership & RACI Across the Org
Framework - SOC 2 Compliance Course
18:09
Episode 6 — Program Roadmap & Realistic Timelines
Framework - SOC 2 Compliance Course
17:33
Episode 7 — Type I vs Type II (and Bridge Letters)
Framework - SOC 2 Compliance Course
17:39
Episode 8 — Writing the System Description
Framework - SOC 2 Compliance Course
18:02
Episode 9 — Subservice Orgs: Inclusive vs Carve-Out
Framework - SOC 2 Compliance Course
17:25
Episode 10 — CUECs Done Right
Framework - SOC 2 Compliance Course
17:29
Episode 11 — How to Read a SOC 2 Report
Framework - SOC 2 Compliance Course
17:47
Episode 12 — CC1 Governance & Tone at the Top
Framework - SOC 2 Compliance Course
18:48
Episode 13 — CC2 Risk Assessment (Method & Cadence)
Framework - SOC 2 Compliance Course
16:59
Episode 14 — CC3 HR Lifecycle: Hiring, Training, Offboarding
Framework - SOC 2 Compliance Course
18:28
Episode 15 — CC4 Commitments, SLAs, Regulatory Requirements
Framework - SOC 2 Compliance Course
17:52
Episode 16 — CC5 Control Design, Reviews, and Monitoring
Framework - SOC 2 Compliance Course
18:07
Episode 17 — CC6 Logical Access: IAM, SSO, MFA, JML
Framework - SOC 2 Compliance Course
18:37
Episode 18 — CC7 Ops: Config Management, Vulnerability Mgmt, Patching
Framework - SOC 2 Compliance Course
16:33
Episode 19 — CC8 Change Management & SDLC (incl. IaC Basics)
Framework - SOC 2 Compliance Course
17:22
Episode 20 — CC9 Incident Management & Communications
Framework - SOC 2 Compliance Course
18:54
Episode 21 — CC10 Data Integrity in Pipelines
Framework - SOC 2 Compliance Course
16:05
Episode 22 — CC11 Vendor Risk & Subservice Oversight
Framework - SOC 2 Compliance Course
18:02
Episode 23 — CC12 Physical/Environmental & Remote-First Realities
Framework - SOC 2 Compliance Course
17:45
Episode 24 — Availability: Capacity, DR, RTO/RPO, Game-Days
Framework - SOC 2 Compliance Course
17:35
Episode 25 — Confidentiality: Classification, Encryption, DLP
Framework - SOC 2 Compliance Course
16:41
Episode 26 — Processing Integrity: Accuracy/Completeness/Monitoring
Framework - SOC 2 Compliance Course
16:51
Episode 27 — Privacy: Notice, Rights, DPIAs, Retention, DSRs
Framework - SOC 2 Compliance Course
16:53
Episode 28 — Privacy in Context: SOC 2 vs ISO 27701 vs HIPAA
Framework - SOC 2 Compliance Course
21:20
Episode 29 — Evidence for A/C/PI/P: What “Good” Looks Like
Framework - SOC 2 Compliance Course
17:36
Episode 30 — Cloud & Multitenant Edge Cases (Scope, Tenancy, Regions)
Framework - SOC 2 Compliance Course
19:43
Episode 31 — Strong Control Narratives: Before/After Examples
Framework - SOC 2 Compliance Course
17:33
Episode 32 — Evidence Strategy & Sampling for Type II
Framework - SOC 2 Compliance Course
16:57
Episode 33 — Continuous Control Monitoring & Automation
Framework - SOC 2 Compliance Course
18:50
Episode 34 — Ticketing as Evidence (Approvals, Change, Incidents)
Framework - SOC 2 Compliance Course
16:51
Episode 35 — Audit-Ready Logs & Screenshots: Accept vs Reject
Framework - SOC 2 Compliance Course
18:49
Episode 36 — CI/CD & Cloud Proofs: Pipelines, Baselines, Diffs
Framework - SOC 2 Compliance Course
18:39
Episode 37 — Policy-to-Practice Traceability (Text → Proof → Tests)
Framework - SOC 2 Compliance Course
18:42
Episode 38 — Selecting the CPA Firm & Independence
Framework - SOC 2 Compliance Course
17:12
Episode 39 — Readiness Assessments & Gap Closure
Framework - SOC 2 Compliance Course
17:18
Episode 40 — Fieldwork Do’s & Don’ts; Request Lists & Walkthroughs
Framework - SOC 2 Compliance Course
16:25