About this course
The Certified Authorization Professional (CAP) program equips a professional with requisite skills and knowledge of authorization and maintenance of information systems within the Risk Management Framework (RMF).
With the learnings in this training program, a professional can easily formalize risk assessment processes and establish cutting-edge security requirements at a growing enterprise. CAP certification is the only certification covered under DoD 8570 mandate concerning RMF. In short, it presents you as an authority on RMF best practices, policies and procedures in front of prospective employers. With the CAP training program, you get to learn from the experts and hone your skills to ace the global CAP certification exam.
Exam Info
CAP is a dominating certification offered by ISC (2). The exam comprises of 125 questions across seven fundamental information security domains. The exam evaluates an individual on the depth of his/her professional knowledge, experience and education related to authorization and maintenance of high-end information systems.
Number of Questions: 125
Exam Length: 3 Hours
Minimum Passing Score: 700
Prerequisites
Anyone with relevant professional experience, knowledge and/or skills in the below mentioned streams is eligible for enrolling in the CAP certification training program.
Systems Administration
IT Security
Information Risk Management
Information Assurance
1-2 Years of Technical Experience
At least 2 Years of General Systems Experience
1-2 Years Database/Network/Systems Development Experience
Proficiency in NIST Documentation
Technical experience of working with US DoD, financial/healthcare agencies and/or audit firms
Target Audience
The training program is particularly beneficial for professionals who wish to clear the ISC (2) CAP certification. Fundamentally, professionals such as authorization officials, system owners, information system security officers, authorization certifiers, senior system managers and information owners have the most to benefit from the program. The program is suitable for professionals working across private, government and civilian organizations and enterprises.
What's Included
CAP training program is designed to maximize learning and cover several aspects related to CAP CBK® taxonomy on information security. This means that the program covers seven fundamental concepts related to information systems security and authorization.
Topics Covered
Understanding the Security Authorization of Information Systems
Categorize Information Systems
Establish the Security Control Baseline
Apply Security Controls
Assess Security Controls
Authorize Information System
Monitor Security Controls
Why Sign Up
Experienced Trainers
Our specialized training experts guide you holistically on various topics and prepare you for success in global CAP certification examination. This ensures you get latest updates regarding curriculum and are trained using best learning and development practices as outlined by the exams common body of knowledge (CBK).
Prerequisites
FAQ
In this welcome video, I give you a quick overview of what the course is about.
In this lecture, I discuss an overview of the "Principles of Behavior Change" module, the 4 power principles of behavior change, and what you should know about those principles when managing your virtual team.
In this lecture, I discuss the five things you should do before every meeting, and how to manage everyone’s expectations through a well-crafted meeting agenda.
In this lecture, I discuss the two things you should do after every meeting, and how to follow up with your team to make sure they are committed to getting their actions completed.
In this lecture, I discuss the five things you should do during every meeting, and how to facilitate your meetings to keep everyone focused on their tasks.
In this lecture, I discuss the following: The mysterious power of writing things down and The advantages of writing tasks out to your virtual team