Why You Must Join Our TPRM Program Starting July 21st 2025
Third-Party Risk Management (TPRM) is a top cybersecurity priority. From vendor hacks to regulatory fines, supply chain risks are exploding. Our COSTPRMS TPRM certification delivers hands-on training using open-source tools across vendor assessment, contract risk, monitoring, and audit readiness. You’ll use tools like OpenGRC, RiskRecon, LibreSign, TheHive, and more to produce dashboards, checklists, and reports that map directly to real job roles. Master third-party risk. Get certified with COSTPRMS and stand out in the job market.
What we cover in our Certified Opensource TPRM Specialist
Addresses everything in industry certifications to move you from Entry Level to Third Party Risk Analyst, to TPRM Specialist and to Third Party Risk Manager, with tools and insights in reporting to the Board while taking you through a hands tools-based journey to address more than 49 Third Pay Risk Management Job Tasks, culminating to a Capstone Project
Module 1: Fundamentals of Third-Party Risk Management
- Understanding Third-Party & Fourth-Party Risks
- Vendor Lifecycle: Onboarding, Due Diligence, Monitoring, and Offboarding
- Understanding the Enterprise Risk Management (ERM) Values
- Differences in TPRM Across Industries
- Building a TPRM Framework Aligned with NIST, ISO, and FAIR Models
Hands-on Labs & Tools: •Google Rapid Response – Vendor cyber risk monitoring; •Open-AudIT – Discover third-party systems and assess security posture.
Deliverable: •Third-Party Risk Management Framework Documentation.
Module 2: Vendor Risk Assessment & Compliance Audits
- Vendor Risk Classification (Tier 1, 2, and 3 Vendors)
- Third-Party Compliance Audits (SOC 2, ISO 27001, PCI DSS, GDPR)
- Risk Assessment and Due Diligence Processes
- Regulatory and Compliance Requirements
Hands-on Labs & Tools: •ERamba (Open-Source GRC) – Managing third-party risk assessments.; •Secure Controls Framework (SCF) – Mapping vendors to compliance frameworks.
Deliverable: Third-Party Compliance Assessment Report
Module 3: Third-Party Cybersecurity & Threat Intelligence
- Security Controls for Third-Party Vendors
- Threat Intelligence Monitoring for Vendor Risks
- Third-Party Incident Response Planning
Hands-on Labs & Tools: •MITRE ATT&CK Framework – Identifying third-party attack patterns; •AlienVault OSSIM – Threat intelligence and anomaly detection; •OpenCTI – Automated threat intelligence tracking for vendor risks.
Deliverable: •Third-Party Threat Intelligence and Risk Report.
Module 4: Vendor Contracts, SLAs & Legal Risk Management
- Drafting Secure Vendor Contracts (SLA, DPA, Indemnification Clauses)
- Third-Party Due Diligence Checklists
- Vendor Breach Notification and Legal Risk Handling
- Governance, Roles, and Responsibilities
Hands-on Labs & Tools: •Nextcloud – Open-source document management for contract tracking; •LibreSign – Open-source contract and e-signature tool; •OpenKM – Vendor risk documentation repository.
Deliverable: •Vendor Contract and Legal Risk Management Report.
Module 5: Industry-Specific Third-Party Risk Management Considerations
- Healthcare (Hospitals, Pharma, MedTech)
- Technology (SaaS, Cloud, Hardware)
- Retail & E-Commerce
- Manufacturing (Automotive, Industrial)
- Energy & Utilities (Oil, Gas, Electric)
- Government & Defense
- Telecommunications (ISPs, Mobile Networks)
- Transportation & Logistics
- Higher Education & Research
Hands-on Labs & Tools: •HIPAA Guard – For healthcare third-party compliance checks; •PCI Security Standards Council SAQ – To assess third-party payment security; •OpenVAS – For vulnerability scanning of third-party networks.
Deliverable: •Industry-Specific Third-Party Risk Assessment Report: Tailored reports for healthcare, finance, retail, and manufacturing vendors.
Module 6: Continuous Monitoring & Incident Response for Vendors
- Automated Vendor Risk Scoring and Continuous Monitoring
- Vendor Breach Response and Third-Party Forensics
- Real-Time Vendor Risk Analytics
- Reporting, Metrics, and Continuous Improvement
Hands-on Labs & Tools: •TheHive (Open-Source Incident Response Platform) – Vendor incident tracking;
•Cortex by TheHive – Automating vendor security monitoring;
•Prowler (AWS Security Auditor) – Assessing cloud vendor security risks.
Deliverable: •Vendor Incident Response and Monitoring Report.
Module 7: Fourth-Party Risk Management
- Understanding Fourth-Party Risks
- Supply Chain Vulnerabilities and Cascade Failures
- Contractual and Compliance Obligations with Fourth Parties
- Techniques for Mapping and Monitoring Fourth-Party Relationships
- Integration with ERM and Supply Chain Risk Management
Hands-on Labs & Tools: •RiskRecon – Open-source tool for fourth-party risk mapping; •SecurityScorecard Free Tier – To evaluate vendor’s third parties;
•GRR – Monitoring downstream vendor activity.
Deliverable: •Fourth-Party Risk Assessment Report: Identifies supply chain risks and recommends mitigation measures; •Vendor Supply Chain Map: Visual representation of direct and indirect vendors.
Module 8: TPRM Automation & AI-Powered Risk Assessments
- Using AI & Automation for TPRM Risk Modeling
- Creating a Scalable TPRM Program in Large Enterprises
- Implementing a Vendor Risk Dashboard for Real-Time Visibility
- Advanced Reporting and Continuous Improvement
Hands-on Labs & Tools: •OpenGRC – Automating vendor compliance tracking; •RiskIT (ISACA Framework) – Building risk-based third-party controls; •OpenCTI & SIEM Integration – Real-time vendor threat intelligence.
Deliverable: •Automated TPRM Dashboard: For continuous vendor risk visibility; •AI-Powered Risk Assessment Report.
Capstone Project: Full-Scale TPRM Framework Implementation
Final Project Requirements:
•Perform a complete third-party and fourth-party risk assessment.
•Build a TPRM framework for an enterprise using open-source tools.
•Develop a continuous monitoring strategy.
•Present the project to a panel of industry experts.
Deliverable:
Final Capstone Presentation: Demonstrates the full TPRM program.
•Compliance and Risk Reports: Includes evidence of assessments and controls.
Customized Cyber Defense Strategies
Securenet Africa stands at the forefront of cybersecurity training and consulting, offering unparalleled expertise to safeguard your digital assets. With a team of seasoned professionals who are dedicated to maintaining the highest security standards, we provide comprehensive solutions tailored to meet the unique needs of each client. Our commitment to continuous innovation and deep understanding of the latest cyber threats ensures that your organization is protected from potential vulnerabilities. Choose Securenet Africa for a proactive approach to cybersecurity that empowers your business and secures your peace of mind.
Elevate Security Strategies Today








What services does Securenet Africa offer?
Where is Securenet Africa located?
How can Securenet Africa improve my company's security?
Secure Your Future Today
Partner with Securenet Africa to fortify your digital frontier. Gain comprehensive cybersecurity training and consulting services tailored to your organization's unique needs.