Class Details

Price: $1,990

GSA Eligible

3-Day Course Includes:

Enroll in this Course with Federal Training Dollars - Learn More!

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • eBooks will be emailed to students registered for Live Online training the week prior to the start of class
  • Course retake option
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

Course Outline

This course provides an in-depth review of the seven domains that are covered in the (ISC) CAP exam. These are the domains and outline effective as of October 15th, 2018:

  1. Information Security Risk Management Program
    • Understand the Foundation of an Organization-Wide Information Security Risk Management Program
    • Principles of information security
    • National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
    • RMF and System Development Life Cycle (SDLC) integration
    • Information System (IS) boundary requirements
    • Approaches to security control allocation
    • Roles and responsibilities in the authorization process
    • Understand Risk Management Program Processes
    • Enterprise program management controls
    • Privacy requirements
    • Third-party hosted Information Systems (IS)
    • Understand Regulatory and Legal Requirements
    • Federal information security requirements
    • Relevant privacy legislation
    • Other applicable security-related mandates
  2. Categorization of Information Systems (IS)
    • Define the Information System (IS)
    • Identify the boundary of the Information System (IS)
    • Describe the architecture
    • Describe Information System (IS) purpose and functionality
    • Determine Categorization of the Information System (IS)
    • Identify the information types processed, stored, or transmitted by the Information System (IS)
    • Determine the impact level on confidentiality, integrity, and availability for each information type
    • Determine Information System (IS) categorization and document results
  3. Selection of Security Controls
    • Identify and Document Baseline and Inherited Controls
    • Select and Tailor Security Controls
    • Determine applicability of recommended baseline
    • Determine appropriate use of overlays
    • Document applicability of security controls
    • Develop Security Control Monitoring Strategy
    • Review and Approve Security Plan (SP)
  4. Implementation of Security Controls
    • Implement Selected Security Controls
    • Confirm that security controls are consistent with enterprise architecture
    • Coordinate inherited controls implementation with common control providers
    • Determine mandatory configuration settings and verify implementation (e.g., United States Government Configuration Baseline (USGCB), National Institute of Standards and Technology (NIST) checklists, Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), Center for Internet Security (CIS) benchmarks)
    • Determine compensating security controls
    • Document Security Control Implementation
    • Capture planned inputs, expected behavior, and expected outputs of security controls
    • Verify documented details are in line with the purpose, scope, and impact of the Information System (IS)
    • Obtain implementation information from appropriate organization entities (e.g., physical security, personnel security)
  5. Assessment of Security Controls
    • Prepare for Security Control Assessment (SCA)
    • Determine Security Control Assessor (SCA) requirements
    • Establish objectives and scope
    • Determine methods and level of effort
    • Determine necessary resources and logistics
    • Collect and review artifacts (e.g., previous assessments, system documentation, policies)
    • Finalize Security Control Assessment (SCA) plan
    • Conduct Security Control Assessment (SCA)
    • Assess security control using standard assessment methods
    • Collect and inventory assessment evidence
    • Analyze assessment results and identify weaknesses
    • Propose remediation actions
    • Review Interim Security Assessment Report (SAR) and Perform Initial Remediation Actions
    • Determine initial risk responses
    • Apply initial remediations
    • Reassess and validate the remediated controls
    • Develop Final Security Assessment Report (SAR) and Optional Addendum
  6. Authorization of Information Systems (IS)
    • Develop Plan of Action and Milestones (POAM)
    • Analyze identified weaknesses or deficiencies
    • Prioritize responses based on risk level
    • Formulate remediation plans
    • Identify resources required to remediate deficiencies
    • Develop schedule for remediation activities
    • Assemble Security Authorization Package
    • Compile required security documentation for Authorizing Official (AO)
    • Determine Information System (IS) Risk
    • Evaluate Information System (IS) risk\
    • Determine risk response options (i.e., accept, avoid, transfer, mitigate, share)
    • Make Security Authorization Decision
    • Determine terms of authorization
  7. Continuous Monitoring
    • Determine Security Impact of Changes to Information System (IS) and Environment
    • Understand configuration management processes
    • Analyze risk due to proposed changes
    • Validate that changes have been correctly implemented
    • Perform Ongoing Security Control Assessments (SCA)
    • Determine specific monitoring tasks and frequency based on the agency's strategy
    • Perform security control assessments based on monitoring strategy
    • Evaluate security status of common and hybrid controls and interconnections
    • Conduct Ongoing Remediation Actions (e.g., resulting from incidents, vulnerability scans, audits, vendor updates)
    • Assess risks
    • Formulate remediation plans
    • Conduct remediation tasks
    • Update Documentation
    • Determine which documents require updates based on results of the continuous monitoring process
    • Perform Periodic Security Status Reporting
    • Determine reporting requirements
    • Perform Ongoing Information System (IS) Risk Acceptance
    • Determine ongoing Information System (IS)
    • Decommission Information System (IS)
    • Determine Information System (IS) decommissioning requirements
    • Communicate decommissioning of Information System (IS)

Class Exam

Certified Authorization Professional (CAP) Certification Exam:

The CAP exam will test the breadth and depth of a student’s knowledge by primarily focusing on the seven domains which make up the topics of CAP CBK®, taxonomy of information security:

  1. The Risk Management Framework (RMF)
  2. Categorizing Different Information Systems
  3. Selecting Security Controls
  4. Implementing Security Controls
  5. Assessing Security Controls
  6. Authorizing Information Systems
  7. Monitoring Security Controls

New Exam Domains effective October 15th, 2018

  1. Information Security Risk Management Program (15%)
  2. Categorization of Information Systems (IS) (13%)
  3. Selection of Security Controls (13%)
  4. Implementation of Security Controls (15%)
  5. Assessment of Security Controls (14%)
  6. Authorization of Information Systems (IS) (14%)
  7. Continuous Monitoring (16%)

Details of the CAP Exam:

  • Questions on the Exam: 125
  • Score Needed to Pass: at least 700/1,000
  • Duration of the Exam: 3 Hours
  • Format of the Exam: multiple choice
  • Delivery Details: The CAP exam is offered through the global network of Pearson VUE testing centers as a computer-based test.

 

Register for Class

Date Location
09/24/18 - 09/26/18, 3 days, 8:00AM – 5:00PM Guam Sold Out!
11/12/18 - 11/14/18, 3 days, 8:30AM – 4:30PM Tysons Corner, VA Register
11/13/18 - 11/15/18, 3 days, 8:30AM – 4:30PM Colorado Springs, CO Register
11/19/18 - 11/21/18, 3 days, 8:30AM – 4:30PM Columbia, MD Register
11/19/18 - 11/21/18, 3 days, 8:30AM – 4:30PM Online Register
12/17/18 - 12/19/18, 3 days, 8:30AM – 4:30PM Fort Gordon, GA Register
12/19/18 - 12/21/18, 3 days, 8:30AM – 4:30PM San Diego, CA Register
01/23/19 - 01/25/19, 3 days, 8:30AM – 4:30PM Colorado Springs, CO Register
02/12/19 - 02/14/19, 3 days, 8:30AM – 4:30PM Tysons Corner, VA Register
02/19/19 - 02/21/19, 3 days, 8:30AM – 4:30PM San Diego, CA Register
02/19/19 - 02/21/19, 3 days, 8:30AM – 4:30PM Columbia, MD Register
02/19/19 - 02/21/19, 3 days, 8:30AM – 4:30PM Online Register
03/27/19 - 03/29/19, 3 days, 8:30AM – 4:30PM Fort Gordon, GA Register
04/24/19 - 04/26/19, 3 days, 8:30AM – 4:30PM Colorado Springs, CO Register
05/06/19 - 05/08/19, 3 days, 8:30AM – 4:30PM Tysons Corner, VA Register
05/13/19 - 05/15/19, 3 days, 8:30AM – 4:30PM San Diego, CA Register
05/13/19 - 05/15/19, 3 days, 8:30AM – 4:30PM Columbia, MD Register
05/13/19 - 05/15/19, 3 days, 8:30AM – 4:30PM Online Register
06/26/19 - 06/28/19, 3 days, 8:30AM – 4:30PM Fort Gordon, GA Register
07/29/19 - 07/31/19, 3 days, 8:30AM – 4:30PM Colorado Springs, CO Register
08/05/19 - 08/07/19, 3 days, 8:30AM – 4:30PM Tysons Corner, VA Register
08/12/19 - 08/14/19, 3 days, 8:30AM – 4:30PM San Diego, CA Register
08/12/19 - 08/14/19, 3 days, 8:30AM – 4:30PM Columbia, MD Register
08/12/19 - 08/14/19, 3 days, 8:30AM – 4:30PM Online Register
09/25/19 - 09/27/19, 3 days, 8:30AM – 4:30PM Fort Gordon, GA Register
10/29/19 - 10/31/19, 3 days, 8:30AM – 4:30PM Colorado Springs, CO Register
11/04/19 - 11/06/19, 3 days, 8:30AM – 4:30PM Tysons Corner, VA Register
11/11/19 - 11/13/19, 3 days, 8:30AM – 4:30PM Columbia, MD Register
11/11/19 - 11/13/19, 3 days, 8:30AM – 4:30PM Online Register
11/12/19 - 11/14/19, 3 days, 8:30AM – 4:30PM San Diego, CA Register
12/18/19 - 12/20/19, 3 days, 8:30AM – 4:30PM Fort Gordon, GA Register