Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.
Course Overview
Phoenix TS CAP® (Certified Authorization Professional) certification course measures the skills, abilities and knowledge required for all professionals involved in the process of maintaining and authorizing information systems. documentation and risks.
Our 3-day, instructor-led CAP (Certified Authorization Professional) training and certification boot camp in Washington, DC Metro, Tysons Corner, VA, Columbia, MD or Live Online is aimed at information systems professionals responsible for making vital security decisions based on risk assessment. It covers seven domains:
- Risk Management Framework (RMF)
- Categorization of information systems
- Selection of security controls
- Implementation of security controls
- Assessment of security controls
- Information systems authorization
- Monitoring of security control
This course will fully prepare you for the (ISC)²® CAP® Certification exam.
Before enrolling in the course, you should have at least two years of experience in one or more of the previously listed CAP® domains. You should also be familiar with NIST documentation.
Schedule
Certification Authorization Professional (CAP) Certification Training
date
location
price
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
This course provides an in-depth review of the seven domains that are covered in the (ISC)2® CAP exam. These are the domains and outline effective as of October 15th, 2018:
Information Security Risk Management Program
- Understand the Foundation of an Organization-Wide Information Security Risk Management Program
- Principles of information security
- National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
- RMF and System Development Life Cycle (SDLC) integration
- Information System (IS) boundary requirements
- Approaches to security control allocation
- Roles and responsibilities in the authorization process
- Understand Risk Management Program Processes
- Enterprise program management controls
- Privacy requirements
- Third-party hosted Information Systems (IS)
- Understand Regulatory and Legal Requirements
- Federal information security requirements
- Relevant privacy legislation
- Other applicable security-related mandates
Categorization of Information Systems (IS) Define the Information System (IS)
- Identify the boundary of the Information System (IS)
- Describe the architecture
- Describe Information System (IS) purpose and functionality
- Determine Categorization of the Information System (IS)
- Identify the information types processed, stored, or transmitted by the
- Information System (IS)
- Determine the impact level on confidentiality, integrity, and availability for each information type
- Determine Information System (IS) categorization and document results
Selection of Security Controls Identify and Document Baseline and Inherited Controls
- Select and Tailor Security Controls
- Determine applicability of recommended baseline
- Determine appropriate use of overlays
- Document applicability of security controls
- Develop Security Control Monitoring Strategy
- Review and Approve Security Plan (SP)
Implementation of Security Controls Implement Selected Security Controls
- Confirm that security controls are consistent with enterprise architecture
- Coordinate inherited controls implementation with common control providers
- Determine mandatory configuration settings and verify implementation (e.g., United States Government Configuration Baseline (USGCB), National Institute of Standards and Technology (NIST) checklists, Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), Center for Internet Security (CIS) benchmarks)
- Determine compensating security controls
- Document Security Control Implementation
- Capture planned inputs, expected behavior, and expected outputs of security controls
- Verify documented details are in line with the purpose, scope, and impact of the Information System (IS)
- Obtain implementation information from appropriate organization entities (e.g., physical security, personnel security)
Assessment of Security Controls Prepare for Security Control Assessment (SCA)
- Determine Security Control Assessor (SCA) requirements
- Establish objectives and scope
- Determine methods and level of effort
- Determine necessary resources and logistics
- Collect and review artifacts (e.g., previous assessments, system documentation, policies)
- Finalize Security Control Assessment (SCA) plan
- Conduct Security Control Assessment (SCA)
- Assess security control using standard assessment methods
- Collect and inventory assessment evidence
- Analyze assessment results and identify weaknesses
- Propose remediation actions
- Review Interim Security Assessment Report (SAR) and Perform Initial Remediation Actions
- Determine initial risk responses
- Apply initial remediations
- Reassess and validate the remediated controls
- Develop Final Security Assessment Report (SAR) and Optional Addendum
Authorization of Information Systems (IS) Develop Plan of Action and Milestones (POAM)
- Analyze identified weaknesses or deficiencies
- Prioritize responses based on risk level
- Formulate remediation plans
- Identify resources required to remediate deficiencies
- Develop schedule for remediation activities
- Assemble Security Authorization Package
- Compile required security documentation for Authorizing Official (AO)
- Determine Information System (IS) Risk
- Evaluate Information System (IS) risk
- Determine risk response options (i.e., accept, avoid, transfer, mitigate, share)
- Make Security Authorization Decision
- Determine terms of authorization
Continuous Monitoring Determine Security Impact of Changes to Information System (IS) and Environment
- Understand configuration management processes
Analyze risk due to proposed changes
Validate that changes have been correctly implemented
Perform Ongoing Security Control Assessments (SCA)
Determine specific monitoring tasks and frequency based on the agency’s strategy
Perform security control assessments based on monitoring strategy
Evaluate security status of common and hybrid controls and interconnections
Conduct Ongoing Remediation Actions (e.g., resulting from incidents, vulnerability scans, audits, vendor updates)
Assess risks
Formulate remediation plans
Conduct remediation tasks
Update Documentation
Determine which documents require updates based on results of the continuous monitoring process
Perform Periodic Security Status Reporting
Determine reporting requirements
Perform Ongoing Information System (IS) Risk Acceptance
Determine ongoing Information System (IS)
Decommission Information System (IS)
Determine Information System (IS) decommissioning requirements
Communicate decommissioning of Information System (IS)
Exam Information
CAP Certification Exam Overview:
The CAP exam will test the breadth and depth of a student’s knowledge by primarily focusing on the seven domains which make up the topics of CAP CBK®, taxonomy of information security:
- Information Security Risk Management Program (15%)
- Categorization of Information Systems (IS) (13%)
- Selection of Security Controls (13%)
- Implementation of Security Controls (15%)
- Assessment of Security Controls (14%)
- Authorization of Information Systems (IS) (14%)
- Continuous Monitoring (16%)
CAP Certification Exam Details:
- Questions on the Exam: 125
- Score Needed to Pass: at least 700/1,000
- Duration of the Exam: 3 Hours
- Format of the Exam: multiple choice
- Delivery Details: The CAP exam is offered through the global network of Pearson VUE testing centers as a computer-based test.
CAP Certification Training FAQs
This certification is sought after by Authorization Officials, Information System Security Officers, Information Owners, System Owners and Senior System Managers.
According to payscale.com, professionals with the CAP certification earn an average salary of $100,000.
CAP Certification Training Resources
-
Blog Post
CompTIA and Continuing Education (CE’s)
-
Blog Post
Boost your Cyber Security Awareness
-
Blog Post
Why You Should Invest in Cyber Security
-
Blog Post
Diversity: A Tough Topic Worth Tackling
-
Blog Post
Benefits and Advantages of Instructor-Led Courseware
-
Blog Post
Data, Data, and more Data!!!
-
Blog Post
Be Prepared for Anything with EDRP
-
Blog Post
Learn How to Make Your Dream Business a Reality
-
Blog Post
The FYI ABOUT PMP from PMI
-
Blog Post
STRENGTHEN YOUR CYBERCORE!
-
Blog Post
Security + Changes!
-
Blog Post
What’s the 411 with the updated CySA+?
-
Blog Post
How to Maintain Team Building While Working Remotely!
-
Blog Post
All About the CISSP
-
Blog Post
Get CCNA-ready in 2020!
-
Blog Post
IT Project Managers, a career of keeping business IT on track!
-
Blog Post
Jira – The Godzilla of Team Support Tools!
-
Blog Post
What’s All the Buzz Around Microsoft Azure?
-
Blog Post
Get the E-Book!
-
Blog Post
The Adobe Connect Way!
-
Blog Post
Train, Test and Certify From Home!
-
Blog Post
Critical Thinking in the Workplace
-
Blog Post
Are you Teleworking Now? Watch out. Cybersecurity risks are everywhere!
-
Blog Post
Everything you wanted to know about the Security+ SY0-601 but were afraid to ask!
-
Blog Post
Hey Remote Worker! You Better be Using Email Best Practices
-
Blog Post
Head in the Cloud? Time to Face Cyber Security Reality
-
Blog Post
Companies use COVID-19 Downtime to Educate their Workforce Online
-
Blog Post
The (ISC)² CAP Exam Updates – October 2018
-
Blog Post
Should You Do eMASS or RMF Training First?
-
Blog Post
Transitioning from DIACAP to RMF
Due to Covid-19 safety restrictions PhoenixTS will temporarily be unable to provide food to our students who attend class at our Training Center; however, our Break Areas are currently open where students will find a constant supply of Coffee, Tea and Water. Students may bring their own lunch and snacks to eat in our breakrooms or at their seat in the classroom or eat out at one of the many nearby restaurants.