Home | Career Tracks | Boot Camps | Course Search | Student Log In | Request Info | 1-800-482-3172 | Contact Us

About Us
Corporate IT Training
Vocational IT Training
CareerSource Solutions
Government/VA Solutions
Financing Options
Other Training Information
Student Resources
Career Services
Promotions
Press Releases
Course Catalog
Course Search
Forms
Real Estate Classes
Store
Connect With Us

 (ISC)2 CAP: Certified Authorization Professional Boot Camp

 

 

Click Here to View Schedules & Pricing and to Enroll Online

 

 

Duration: 5 Days

 

 

Description:

 

The Certified Authorization Professional (CAP) credential is an objective measure of the knowledge, skills and abilities required for personnel involved in the process of authorizing and maintaining information systems. Specifically, this credential applies to those responsible for formalizing processes used to assess risk and establish security requirements and documentation. Their decisions will ensure that information systems possess security commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.

This course prepares the student for the (ISC)2 CAP (Certified Authorization Professional formerly the Certification and Accreditation Professional) exam. In addition, this course teaches students the skills and knowledge concerning the Risk Management Framework (RMF) as defined by the National Institute of Standards and Technology (NIST) in support of Federal Information Security Management Act (FISMA).

 

 

Prerequisites:

 

Security+ (2007)

 

 

What's Included:

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers  & Onsite Certification Testing
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

 

 

Course Outline:

 

• (ISC)2 CAP Certification
• Introduction
• Building a Successful Program
• RMF Roles and Responsibilities
• The RMF Life Cycle
• Why RMF Programs Fail or Lack Efficiency
• RMF Project Planning
• System Categorization and Definition
• Security Categorization
• Information Systems Boundaries
• Security Control Selection and Documentation
• Minimum Security Baselines and Best Practices
• System Security Plan (SSP)
• Control Implementation
• Prioritized Approach
• Configuration Management
• Security Procedures
• Coordinating Security for Interconnected Systems
• Assessing Security Controls
• Remediation Planning
• Essential RMF Documentation
• Assessing Risk
• Documenting the Authorization Decision
• Continuous Monitoring
• Contingency Planning
• Security Awareness
• Review
• Exam Preparation

Academy Code of Honor:  
The Academy guarantees that students shall pass all vendor examinations during the training program or may re-attend within one year of the program completion date. Students will only be responsible for accommodations and vendor exam fees.  

Student Login | Request Info | Course Search | Contact Us