logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

CAP - Certified Authorization Professional Certification

SS Course: 2001203

Course Overview

TOP

You can expect an in-depth review of the seven domains of the CAP CBK — including discussion of industry best practices and timely security concepts.

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP

You’ll receive:

  • Three days of training in a classroom setting
  • Expert, in-person instruction from an (ISC)²-Authorized Instructor
  • Useful collaboration with classmates
  • Real-world scenarios and case studies 
  • Interactive and engaging learning activities to improve collaboration and ensure concepts stick 
  • Up-to-date, official (ISC)² courseware

Outline

TOP
Viewing outline for:

The CAP certification training course provides an in-depth review of the seven domains that are covered in the (ISC) CAP exam. These domains are:

  1. The Risk Management Framework (RMF)
  2. Categorizing Different Information Systems
  3. Selecting Security Controls
  4. Implementing Security Controls
  5. Assessing Security Controls
  6. Authorizing Information Systems
  7. Monitoring Security Controls

Prerequisites

TOP

Before attending this course, students should have:

  • One to two years of general work experience in the technical/systems field and in systems and network development
  • Familiarity with the NIST documentation
  • Extensive information security experience in the following areas:
    • IT Security
    • Systems Administration
    • Information Assurance
    • Information Risk Management
    • Information Security Policy
    • Auditing

    Who Should Attend

    TOP

    This course is intended for information security professionals:

    • Authorization Officials
    • Information System Security Officers
    • Information Owners
    • System Owners
    • Senior System Managers

    Next Step Courses

    TOP