Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Phoenix TS
  4. CAP - Certified Authorization Professional Certification

CAP - Certified Authorization Professional Certification

This ISC²® training course is available online and in-person. The three-day instructor-led training experience provides information security professionals with the ability to make effective decisions related to potential security risk and damage for organizations. The CAP® certification verifies an individual's skills and knowledge for implementing Risk Management Framework, identifying security controls and vulnerabilities for measuring organizational risks.

Course Overview

Overall Proficiency Level
3 - Advanced
Course Prerequisites

This course is intended for information security professionals:

  • Authorization Officials
  • Information System Security Officers
  • Information Owners
  • System Owners
  • Senior System Managers

 Recommended Experience

Before attending this course, students should have:

  • One to two years of general work experience in the technical/systems field and in systems and network development
  • Familiarity with the NIST documentation
  • Extensive information security experience in the following areas:
    • IT Security
    • Systems Administration
    • Information Assurance
    • Information Risk Management
    • Information Security Policy
    • Auditing
Training Purpose
Skill Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Location

10420 Little Patuxent Pky Suite 500
Columbia, MD 21044

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led

Learning Objectives

This course prepares students for the CAP certification exam. Upon course completion students should have a thorough understanding of: The Risk Management Framework (RMF), Categorizing Different Information Systems, Selecting Security Controls, Implementing Security Controls, Assessing Security Controls, Authorizing Information Systems, and Monitoring Security Controls.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Program/Project Management and Acquisition
  • Risk Management

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: