Cybersecurity Compliance Training Program

Earn certification in cybersecurity compliance training

Cybersecurity Compliance Training Program

Are you looking for cybersecurity training for your IT professionals to enhance their skills for efficient and secure business operations?

Our Cybersecurity Training Program is designed to enhance your organization’s cybersecurity knowledge and skills, ensuring you are well-equipped to handle and mitigate cyber threats. Built-in tandem with Cocoon CS compliance tools, this program offers a comprehensive approach to cybersecurity.

Cocoon CS’s compliance toolkit is designed to help businesses comply with industry-standard security and privacy programs like SOC 2, ISO 27001, CMMC, NIST, and CyberSecure Canada. By integrating these compliance tools, our training program provides a holistic approach to learning cybersecurity, empowering IT professionals with the understanding and experience necessary to protect their organizations against evolving cyber threats.

This Cybersecurity Training Program is specifically designed so you can receive hands-on guidance to implement your learning into a cybersecurity program that will benefit your organization.

Components of the Training Program

How It Works

You must complete all eight training modules to receive a completion certificate for this course. Most of these modules are delivered weekly.
Each week will consist of a virtual session conducted by CISO introducing the topic for that week, and 2-3 hours of self-paced learning. The first half of each session will be a review of the previous module assignments, and our trained coordinators and CISOs will provide feedback on implementation strategies. The second half of the session will introduce the next topic.
In between structured module training sessions, trainees can contact Cocoon CS support for help while working through the self-paced portion.

  • This course consists of 22-35 hours of training (depending on the duration of self-paced progress)
  • Once started, this training program is generally completed within ten weeks (unless an extended training arrangement is made)

Completion

After completing the training modules, you will have built and launched a cybersecurity program for your organization.


Trainees will receive a certificate of completion from Cocoon CS detailing the areas in which they have been trained.

Course Outline:

Part A: Cybersecurity Fundamentals

Module 1: What is Cybersecurity? (1 Hour)

Objectives: 

  • Introduction to Cybersecurity
  • Compliance in Cybersecurity
  • Industry Recognized Frameworks

Outcome:

  • Set up Cocoon CS portal

Part B: Cocoon CS Compliance Toolkit

Module 2.1: Security Assessments - Overview (1 Hour)

Objectives: 

  • Introduction to the Assessment
  • Identify cybersecurity controls within your organization
  • Identify deficiencies in your cybsersecurity program
  • Identify program controls required for cybersecurity compliance

Assignment:

  • Complete the Assessment

Outcome:

  • Assessment Report and Security Scorecard

Module 2.2: Security Assessments - Review (1 Hour)

Objectives: 

  • Understand compliance scorecard, adopted controls, and deficiencies
  • Determine what deficiencies can be resolved
  • Work with a CISO to build a plan of action to resolve deficiencies

Assignment:

  • Build a roadmap to address deficiencies

Outcome:

  • Action Plan for becoming security compliant with Compliance Toolkit

Module 3: Policy Building (1 Hour)

Objectives: 

  • Introduction to Building Policies and their importance
  • Establish security policies that align with framework requirements
  • Communicate security policies to stakeholders
  • Develop a policy lifecycle plan

Assignment: 

  • Go through the policies on the portal and understand how they align with frameworks

Outcome:

  • Functional Policies for your organization

Module 4: Asset Management (1 Hour)

Objectives: 

  • Introduction to Asset Management
  • Track assets within your organization
  • Create an Asset Management Strategy
  • Continually monitor assets
  • Hardening Guides

Outcome:

  • Updated inventory of IT assets

Module 5.1: Incident Response Planning - Make a Plan (1 Hour)

Objectives: 

  • Introduction to Incident Response Plan
  • Understand the need for incident response plans
  • Develop a general incident response plan
  • Develop incident-specific runbooks

Outcome:

  • Primed Incidence Response Plan and Runbooks 

Module 5.2: Incidence Response Planning - Tabletop Exercises (1 Hour)

Objectives: 

  • Test the effectiveness of Incident Response Plans
  • Prepare tabletop exercises
  • Learn how to conduct tabletop exercises
  • Tabletop summary

Outcome:

  • Improved and tested response plans

Module 6: Risk Management (1 Hour)

Objectives: 

  • Introduction to Risk Management
  • Understand your organization’s risk level
  • Identify risk scenarios
  • Establish risk mitigation strategies

Outcome:

  • Risk Management Plan

Module 7: Security Awareness Training (2 Hour)

Objectives: 

  • Introduction to Security Awareness Training
  • Training Assessments
  • Build training program initiatives
  • Define metrics for an effective training program
  • Customize training to the needs of your organization
  • Establish a culture of security awareness

Assignments:

  • Complete Training Assessments
  • Describe metrics in reports

Outcome:

  • Conduct employee awareness training programs
  • Track employee progress

Module 8: Artifact Collection and Audit-Readiness (1 Hour)

Objectives: 

  • Introduction to Artifact gathering
  • Demonstrate a system for centralized artifact logging
  • CISO artifact review
  • Learn about audit-readiness

Assignment:

  • Collect Artifacts

Outcome:

  • Collected artifacts for framework compliance
  • Audit-readiness

Apply for the Cocoon CS Cybersecurity Training Program

Getting Started:

This training program will help your organization to develop an in-house cybersecurity skill set and team. 

Complete a 22-hour guided training program over the course of 10 weeks that teaches you how to build, implement, and maintain a cybersecurity program in your organization.

Part A: Cybersecurity Fundamentals

Module 1: What is cybersecurity?

Part B: Cocoon CS Compliance Toolkit

Module 2: Security Assessment 

Module 3: Policy Building

Module 4: Asset Management

Module 5: Incident Response Planning

Module 6: Risk Management

Module 7: Security Awareness Training

Module 8: Artifact Collection and Audit-Readiness

Certificate of Completion

Upon completion of all 8 modules, you will be prepared to manage your organization’s cybersecurity program and become compliant with security frameworks.