Course Information

Duration

Minimum of 40 Hours

Exam Time

2 Hours Exam

Course Type

Self Paced / Blended / Classroom

Structure

Curriculum

Day 1

  • Importance of SOC and the Need for SOC Compliance
  • Risk Assessment Awareness Part I - RM00103
  • System & Organization Controls (SOC) Part I - CO00501

Day 2

  • System & Organization Controls (SOC) Part II - CO00502
  • System & Organization Controls (SOC) Part III - CO00503
  • System & Organization Controls (SOC) Part IV - CO00504

Day 3

  • System & Organization Controls (SOC) Part V - CO00505
  • System & Organization Controls (SOC) Part VI – CO00506

Day 4

  • System & Organization Controls (SOC) Part VII – CO00507
  • Information Technology General Controls (ITGC) Part I
  • Information Technology General Controls (ITGC) COSO Framework Part II

Day 5

  • Information Technology General Controls (ITGC) Part III
  • Exam

Course Details

Importance of SOC and the Need for SOC Compliance


The course includes cybersecurity and privacy knowledge test as users progress through the training. The training is designed to protect and preserve the confidentiality, integrity, and availability of information owned by or in the care of the corporation.


Risk Assessment Awareness Part I - RM00103


The course provides in-depth knowledge of risk management concepts and fundamentals. The course improves risk awareness, promotes an open risk culture, and inclusion of risk in the decision-making process.


System & Organization Controls (SOC) Part I - CO00501


The training will help organizations to have the in-house skills and end-to-end knowledge in deciding the type of certification, type of documentation, type of skills, and type of controls required to certify. Part I is about a basic understanding of SOC1, SOC2, and SOC3; SOC2 driving factors; the difference between Type I and Type II SOC; factors driving the audit scope; the foundation of SOC report; and trust service principles.


System & Organization Controls (SOC) Part II - CO00502


Part II explains the SOC2 audit requirements, who can perform the audit, and applying relevant SSAE 18 standards.The training will help organizations to have the in-house skill and end-to-end knowledge in deciding the type of certification, type of documentation, type of skills, and type of controls required to certify.


System & Organization Controls (SOC) Part III - CO00503


Part III provides in-depth knowledge of Trust Service, Criteria, Common Criteria, and Supplemental criteria. You will learn to select the Trust Service Criteria for your organization, understand the underlying expectations under each Trust Service Criteria, the importance of Security criteria, and why it is mandatory.


System & Organization Controls (SOC) Part IV - CO00504


Part IV provides practical implementation knowledge of Common Criteria and Supplemental Criteria. You will learn about Generally Accepted Privacy Principles (GAPP), what’s included in the SOC report, what’s included in Management Assertions, and the Description of the System.


System & Organization Controls (SOC) Part V - CO00505


Part V will further enhance your skills in key areas of writing system description, which include system overview, infrastructure details, relevant aspects of controls, and complementary user-entity controls. You will learn to describe the control environment, risk assessment process, information communication systems, and control monitoring process.


System & Organization Controls (SOC) Part VI - CO00506


Part VI educates the user about vendors due to diligence and the use of SOC2 reports. You will learn how user organizations can adopt the SOC report, identify the relevant report user organization will need from a vendor, and understand the report content and different types of SOC reports.


System & Organization Controls (SOC) Part VII – CO00507


SOC stands for “System and Organization Controls” and is the agreed-upon control procedure set by the American Institute of Certified Public Accountants (AICPA). These defined sets of controls are a series of standards or benchmarks designed to help measure how well a given service organization conducts and regulates its information.


Information Technology General Controls (ITGC) Part I


The course provides a detailed understanding of the COSO components, objectives, entity-level consideration, financial reporting assertions, use COBIT, ISO 27000, ITIL for SOX compliance, and more. The course content is precise and to the point, with a focus on knowledge application and practical considerations.


Information Technology General Controls (ITGC) Part II


The course ITGC Part II is designed to ensure employees understand the importance of their role in a public company and comply with the regulatory requirements by implementing correct security controls to ensure that financial data is accurate and protected against loss. You will learn about evaluating and auditing IT general controls.


Information Technology General Controls (ITGC) Part III


In ITGC Part III of the course, you will learn about the Information Technology Governance considerations in SOX compliance and SOX requirements for application change controls, data backup and recovery, systems development life cycle, and outsourcing financial applications.


Exam


You have total 3 attempts for this exam.

SOC stands for “System and Organization Controls” and is the agreed-upon control procedure set by the American Institute of Certified Public Accountants (AICPA).

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

These defined sets of controls are a series of standards or benchmarks designed to help measure how well a given service organization conducts and regulates its information. The training is focused on the "Do it yourself" ("DIY") concept. The SOC cybersecurity DIY training series is designed to educate learners in implementing SOC.

SOC for Service Organizations report is designed to help service organizations that provide services to other entities, build trust and confidence in the service performed and controls related to the services through a report by an independent auditor.

Each type of SOC for Service Organizations report is designed to help service organizations meet specific user needs. These reports can play an important role in:

  • Oversight of the organization

  • Vendor management programs

  • Internal corporate governance and risk management processes

  • Regulatory oversight

The training will help organizations have in-house skills and end-to-end knowledge in deciding the type of certification, type of documentation, type of skills, and type of controls required to certify.

You will learn about SOC 1, SOC 2, SOC 3, SOC 2 +, SOC for Cyber Security, SOC for Supply Chain, and SOC 2 + Additional Subject Matter Reports as well as the scope and use of these reports. The study contains case studies for SOC for Cyber Security and SOC for the supply chain. You will learn about mapping Trust Service Criteria to other standards and frameworks.

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

  • You are currently studying technical field such as engineering or anything remotely related to technology then you want to expand your cyber knowledge, protect from hacks, investigate hacks, protect from attacks, protect data and learn hands-on skills to apply on the job.
  • You are currently studying non-technical field and you want to learn on how to keep data secure (such as corporate information, bank data, personal data, health data, accounts information) by timely reporting of incidents and early understanding what could be breach.
  • You are a part of a company that has urgent cybersecurity needs to protect the confidentiality, availability, and integrity of data and software.Provident mollitia neque rerum asperiores dolores quos qui a. Ipsum neque dolor voluptate nisi sed.
  • The nature of business you are in, or your corporation handles highly sensitive data, and you wish to learn hands-on skills to protect the data.
  • You understand the growing need for cybersecurity professionals and want to become a part of making the computer network a safer space and compliant organization to avoid penalties
  • You are a tech enthusiast looking to start your career in tech and get your foot in the door in the world of networking and security on a stable, safe, and resilient cyberspace
Excel Your Career and Contribute to the Organization Growth

CSA is a training and credentialing program helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC compliance team.

  • To demonstrate your superior security practices to stakeholders.
  • To demonstrate the adoption of security practices and controls.
  • Provide guidance specific to your organization that will help you improve controls and mitigate your risks.
  • By understanding potential deficiencies in your control environment, you may be better positioned to ward off cyber attacks or data breaches.
  • Showcase that company employs qualified and trained staff.
  • Increased reliance by vendors on provider’s security and compliance commitments.
  • Knowledge serves foundation many other compliance and cyber certifications.

Various Job Oppoortunites are :


  • Compliance Analysts (Tier I and Tier II)
  • SOX Internal Auditor or Analyst
  • Auditor and Assessors (Big 4 & Multinationals)
  • Consultant (Junior/Senior/Manager) for Big 4 US Offices
  • Cybersecurity Analyst with Multinationals
  • Entry-level cybersecurity professionals
  • Anyone who wants to become a Compliance Specialist

Eligibility :

The program requires the candidate who is pursuing degree courses or have basic knowledge of IT, Information Security Domains or currently studying the IT Security Certification Courses such as C-CSC, C-SOX, C-IS,… or pursuing college degree in engineering and commerce. Some students may need to take Foundation Course Part I to gain knowledge of basic information security principles.

Take Exam

The candidate is eligible for CSC Council exam if he meets the Eligibility criteria listed below :

  • Applicants who do not attend training must prove 1 year of work experience in the compliance area
  • Applicants who are instructors, trainers, and PhDs shall also be eligible if they meet the above criteria.
  • On the application, there is a section for the applicant to list a boss, supervisor, or department lead who will act as their verifier.
  • If further information is requested from the applicant after the application is submitted and 90 days pass with no response from the applicant, the application will be automatically rejected, and a new form will have to be submitted.
  • If application is not approved, the application fee of USD 100 will not be refunded.
  • If the application is approved, then candidate must take exam in 15 working days

Apply Now

CSC - Certified AICPA SOC Master Implementer (CASI)

Certified AICPA SOC Master Implementer (CASI)

SOC stands for “System and Organization Controls” and is the agreed-upon control procedure set by the American Institute of Certified Public Accountants (AICPA). These defined sets of controls are a series of standards or benchmarks designed to help measure how well a given service organization conducts and regulates its information.

Material of SOC

SOC for Service Organizations report is designed to help service organizations that provide services to other entities, build trust and confidence in the service performed and controls related to the services through a report by an independent auditor.The training is focused on the "Do it yourself" ("DIY") concept. The SOC cybersecurity DIY training series is designed to educate learners in implementing SOC.

Each type of SOC for Service Organizations report is designed to help service organizations meet specific user needs. These reports can play an important role in:

Price of the Course SOC

Price: $ 900.00

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

SOC Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

CSC - Certified AICPA SOC Master Implementer (CASI)

Certified AICPA SOC Master Implementer (CASI)

SOC stands for “System and Organization Controls” and is the agreed-upon control procedure set by the American Institute of Certified Public Accountants (AICPA). These defined sets of controls are a series of standards or benchmarks designed to help measure how well a given service organization conducts and regulates its information.

Material of SOC

SOC for Service Organizations report is designed to help service organizations that provide services to other entities, build trust and confidence in the service performed and controls related to the services through a report by an independent auditor.The training is focused on the "Do it yourself" ("DIY") concept. The SOC cybersecurity DIY training series is designed to educate learners in implementing SOC.

Each type of SOC for Service Organizations report is designed to help service organizations meet specific user needs. These reports can play an important role in:

Price of the Blended Course SOC

Price: $ 900.00


The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

SOC Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.


Contact Us for Classroom Course Schedule

Disclaimer

CSC-Council reserves the right to impose additional restriction to comply with the policy.

Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council.

CSC-Council reserves the right to revoke the certification of any person in breach of this requirement.