(ISC)2 CAP: Certified Authorization Professional Boot Camp

Description

Duration: 5 Days

The Certified Authorization Professional (CAP) credential is an objective measure of the knowledge, skills, and abilities required for personnel involved in the process of authorizing and maintaining information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements and documentation. Their decisions will ensure that the information system possesses security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.

This five-day course prepares the student for the (ISC)2 CAP (Certified Authorization Professional formerly the Certification and Accreditation Professional) exam. In addition, this course teaches students the skills and knowledge concerning the Risk Management Framework (RMF) as defined by the National Institute of Standards and Technology (NIST) in support of the Federal Information Security Management Act (FISMA).

Prerequisites

  • Security+ (2007)

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor-Led (the best training format we offer)
  • Live Online Classroom – Online Instructor-Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
9/23/20249/27/2024
10/14/202410/18/2024
11/4/202411/8/2024
11/25/202411/29/2024
12/16/202412/20/2024
1/6/20251/10/2025
1/27/20251/31/2025
2/17/20252/21/2025
3/10/20253/14/2025
3/31/20254/4/2025
4/21/20254/25/2025
5/12/20255/16/2025
6/2/20256/6/2025
6/23/20256/27/2025
7/14/20257/18/2025
8/4/20258/8/2025
8/25/20258/29/2025
9/15/20259/19/2025
10/6/202510/10/2025
10/27/202510/31/2025
11/17/202511/21/2025
12/8/202512/12/2025
12/29/20251/2/2026

Curriculum

  • (ISC)2 CAP Certification
  • Introduction
  • Building a Successful Program
  • RMF Roles and Responsibilities
  • The RMF Life Cycle
  • Why RMF Programs Fail or Lack of Efficiency
  • RMF Project Planning
  • System Categorization and Definition
  • Security Categorization
  • Information Systems Boundaries
  • Security Control Selection and Documentation
  • Minimum Security Baselines and Best Practices
  • System Security Plan (SSP)
  • Control Implementation
  • Prioritized Approach
  • Configuration Management
  • Security Procedures
  • Coordinating Security for Interconnected Systems
  • Assessing Security Controls
  • Remediation Planning
  • Essential RMF Documentation
  • Assessing Risk
  • Documenting the Authorization Decision
  • Continuous Monitoring
  • Contingency Planning
  • Security Awareness
  • Review
  • Exam Preparation