• Home
  • Certifications
    • Adobe
    • Analytics & Data Management
    • Android
    • Application Development
    • AWS
    • Biocertification
    • CertCop
    • CISCO
    • Cloud Computing & Virtualization
    • CompTIA
    • Cyber & Network Security
    • Database
    • DoD 8140/8570.01
    • EC-Council
    • EMC2
    • Intel
    • ISACA
    • ISC2
    • ITIL
    • Micro Focus
    • Microsoft
    • PECB
    • PMI
    • PostgreSQL
    • Splunk
    • SUSE
    • VMware
    • Wireshark
  • Training Programs
    • Training Catalog
    • ON-Demand Training
    • Govt./DoD 8570.1 Discount Pricing
    • CertPass Offerings
    • Virtuallivetraining 100% Exam Pass Guarantee
    • Virtuallivetraining Promotions
    • Biometrics Webinars
  • Delivery Methods
    • Virtual Live Training
    • On Demand / Self Study
    • Virtual Live Group Training
    • 1-1 mentoring
  • Exam Prep Tools
    • Practice Exam
    • Flash Cards
    • Mock Exam
    • Complete Bundles
    • e-Book
    • Special Price
    • Exam Voucher
  • Services & Solutions
    • CertTemps
    • Corporate Executive Technology Essentials Program
    • Consulting & Technical Support Services
    • Industries
    • Preferred Clients
    • Refer a Friend
    • Training Program Development & Management
  • Resources & Support
    • Scholarship Application Form
    • Host your Course here
    • Exam Prep & Pre-Assessment
    • Special Events & Free Training Offerings
    • Post Training E-mail Support
    • Post Training Evaluation
  • Company
    • Registration Form
    • Become a Virtual Live Training Authorized Training Reseller
    • Locations
    • Shopping Cart
    • Blog
    • Terms and Conditions
    • Testimonial and Clients
    • About Us
    • Why Virtuallivetraining
    Have any question?
    1-630-684-0355
    info@virtuallivetraining.com
    RegisterLogin
    REFER AND EARN        Cart       My orders      
    virtuallivetraining.com
    • Home
    • Certifications
      • Adobe
      • Analytics & Data Management
      • Android
      • Application Development
      • AWS
      • Biocertification
      • CertCop
      • CISCO
      • Cloud Computing & Virtualization
      • CompTIA
      • Cyber & Network Security
      • Database
      • DoD 8140/8570.01
      • EC-Council
      • EMC2
      • Intel
      • ISACA
      • ISC2
      • ITIL
      • Micro Focus
      • Microsoft
      • PECB
      • PMI
      • PostgreSQL
      • Splunk
      • SUSE
      • VMware
      • Wireshark
    • Training Programs
      • Training Catalog
      • ON-Demand Training
      • Govt./DoD 8570.1 Discount Pricing
      • CertPass Offerings
      • Virtuallivetraining 100% Exam Pass Guarantee
      • Virtuallivetraining Promotions
      • Biometrics Webinars
    • Delivery Methods
      • Virtual Live Training
      • On Demand / Self Study
      • Virtual Live Group Training
      • 1-1 mentoring
    • Exam Prep Tools
      • Practice Exam
      • Flash Cards
      • Mock Exam
      • Complete Bundles
      • e-Book
      • Special Price
      • Exam Voucher
    • Services & Solutions
      • CertTemps
      • Corporate Executive Technology Essentials Program
      • Consulting & Technical Support Services
      • Industries
      • Preferred Clients
      • Refer a Friend
      • Training Program Development & Management
    • Resources & Support
      • Scholarship Application Form
      • Host your Course here
      • Exam Prep & Pre-Assessment
      • Special Events & Free Training Offerings
      • Post Training E-mail Support
      • Post Training Evaluation
    • Company
      • Registration Form
      • Become a Virtual Live Training Authorized Training Reseller
      • Locations
      • Shopping Cart
      • Blog
      • Terms and Conditions
      • Testimonial and Clients
      • About Us
      • Why Virtuallivetraining

      ISC2

      • Home
      • All courses
      • ISC2
      • Certified Authorization Professional

      Certified Authorization Professional

      Admin bar avatar
      VLT
      ISC2

      On Demand $2,495.00

      Virtual Live







      cap
      • Overview
      • Curriculum
      • Instructor

      Course Description

      The Certified Authorization Professional (CAP) is an information security practitioner who advocates for security risk management in pursuit of information system authorization to support an organization’s mission and operations in accordance with legal and regulatory requirements.

      The broad spectrum of topics included in the CAP Common Body of Knowledge (CBK) ensures its relevancy across all disciplines in the field of information security.

      Program Objectives

      • Information Security Risk Management Program
      • Scope of the Information System
      • Selection and Approval of Security and Privacy Controls
      • Implementation of Security and Privacy Controls
      • Assessment/Audit of Security and Privacy Controls
      • Authorization/Approval of Information System
      • Continuous Monitoring

      After completing this course, the student will be able to:

      • Identify and describe the steps and tasks within the NIST Risk Management Framework (RMF).
      • Describe the roles associated with the RMF and how they are assigned to tasks within the RMF.
      • Execute tasks within the RMF process based on assignment to one or more RMF roles.
      • Explain organizational risk management and how it is supported by the RMF.

       

      Prerequisites

      To qualify for the CAP, candidates must pass the exam and have at least two years of cumulative, paid work experience in one or more of the seven domains of the (ISC)2 CAP Common Body of Knowledge (CBK®).

      Course Features

      • Lectures 27
      • Quizzes 0
      • Duration 40 hours
      • Skill level Intermediate Level
      • Language English
      • Students 583
      • Certificate No
      • Assessments Yes
      CoursesISC2Certified Authorization Professional
      • Domain 1:Information Security Risk Management Program
        3
        • Lecture1.1
          1.1 Understand the Foundation of an Organization-Wide Information Security Risk Management Program
        • Lecture1.2
          1.2 Understand Risk Management Program Processes
        • Lecture1.3
          1.3 Understand Regulatory and Legal Requirements
      • Domain 2:Categorization of Information Systems (IS)
        2
        • Lecture2.1
          2.1 Define the Information System (IS)
        • Lecture2.2
          2.2 Determine Categorization of the Information System (IS)
      • Domain 3:Selection of Security Controls
        4
        • Lecture3.1
          3.1 Identify and Document Baseline and Inherited Controls
        • Lecture3.2
          3.2 Select and Tailor Security Controls
        • Lecture3.3
          3.3 Develop Security Control Monitoring Strategy
        • Lecture3.4
          3.4 Review and Approve Security Plan (SP)
      • Domain 4:Implementation of Security Controls
        2
        • Lecture4.1
          4.1 Implement Selected Security Controls
        • Lecture4.2
          4.2 Document Security Control Implementation
      • Domain 5:Assessment of Security Controls
        5
        • Lecture5.1
          5.1 Prepare for Security Control Assessment (SCA)
        • Lecture5.2
          5.2 Conduct Security Control Assessment (SCA)
        • Lecture5.3
          5.3 Prepare Initial Security Assessment Report (SAR)
        • Lecture5.4
          5.4 Review Interim Security Assessment Report (SAR) and Perform Initial Remediation Actions
        • Lecture5.5
          5.5 Develop Final Security Assessment Report (SAR) and Optional Addendum
      • Domain 6:Authorization of Information Systems (IS)
        4
        • Lecture6.1
          6.1 Develop Plan of Action and Milestones (POAM)
        • Lecture6.2
          6.2 Assemble Security Authorization Package
        • Lecture6.3
          6.3 Determine Information System (IS) Risk
        • Lecture6.4
          6.4 Make Security Authorization Decision
      • Domain 7:Continuous Monitoring
        7
        • Lecture7.1
          7.1 Determine Security Impact of Changes to Information Systems (IS) and Environment
        • Lecture7.2
          7.2 Perform Ongoing Security Control Assessments (SCA)
        • Lecture7.3
          7.3 Conduct Ongoing Remediation Actions (e.g., resulting from incidents, vulnerability scans, audits, vendor updates)
        • Lecture7.4
          7.4 Update Documentation
        • Lecture7.5
          7.5 Perform Periodic Security Status Reporting
        • Lecture7.6
          7.6 Perform Ongoing Information System (IS) Risk Acceptance
        • Lecture7.7
          7.7 Decommission Information System (IS)
      Admin bar avatar
      VLT
      • Share:

      You May Like

      CISM Reference materials
      Admin bar avatar
      VLT

      CISM Reference materials

      0
      Free
      Certified Information Security Manager (CISM) Flash Cards
      Admin bar avatar
      VLT

      Certified Information Security Manager (CISM) Flash Cards

      0
      $99.00$25.00
      CISSP e-Slides
      Admin bar avatar
      VLT

      CISSP e-Slides

      0
      $25.00
      CompTIA CASP+ Scenario Based Questions
      Admin bar avatar
      VLT

      CompTIA CASP+ Scenario Based Questions

      13
      $99.00
      CASP+ Reference Materials
      Admin bar avatar
      VLT

      CASP+ Reference Materials

      11
      $25.00

      Leave A Reply Cancel reply

      Your email address will not be published. Required fields are marked *

      All Courses

      • Adobe
      • Analytics & Data Management
      • Android
      • Application Development
      • AWS
      • Biocertification
      • CertCop
      • CISCO
      • Cloud Computing & Virtualization
      • CompTIA
      • Cyber & Network Security
      • Database
      • DoD 8140/8570.01
      • EC-Council
      • EMC2
      • Intel
      • ISACA
      • ISC2
      • ITIL
      • Micro Focus
      • Microsoft
      • PECB
      • PMI
      • PostgreSQL
      • Splunk
      • SUSE
      • VMware
      • Wireshark

      Latest Courses

      CISM Reference materials

      Free
      Certified Information Security Manager (CISM) Flash Cards

      Certified Information Security Manager (CISM) Flash Cards

      $99.00 $25.00
      CISSP e-Slides

      CISSP e-Slides

      $25.00

      logo-eduma-the-best-lms-wordpress-theme

      1-630-684-0355

      info@virtuallivetraining.com

      •  
      •  
      •  
      •  

      Company

      • About Us
      • Locations
      • Contact us
      • Become an Instructor

      Links

      • Course Registration
      • Courses
      • FAQs

      Support

      • Technical support
      • Corporate Group Training
      • Request a call back
      • Discount/Free Course

      Recommend

      • virtuallivetraining
      • Postgresqlcert
      • Certcop
      • Exam IT
      • Saifirst

      Copyright@ 2005-2022 virtuallivetraining [A CertFirst Company]

      • Privacy
      • Terms
      • Sitemap
      • Purchase

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account

      Are you a member? Login now

      Modal title

      Message modal