CAP Certification Training | Certified Authorization Professional Training

Introduction:

CAP Certification Training | Certified Authorization Professional Training Course Hands-on

Gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices with this CAP Certification Training | Certified Authorization Professional Training.

Achieving Certified Authorization Professional (CAP) certification validates your qualifications, skills, and experience in applying, assessing, and maintaining information system security using the new National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). On the path to CAP certification, you will gain the knowledge and skills needed to accurately and effectively apply cost-effective and appropriate security controls based on risk and best practices. The CAP certification is accepted by private and government sectors, and in some organizations, it is required for specific jobs (i.e., DoD Directive 8570).

Enosecurity's CAP Certification Training | Certified Authorization Professional Training focuses on preparing students for the updated CAP certification through extensive mentoring and drill sessions, thorough review of all 7 CAP Domains of Knowledge (recently increased from 4), and practical question and answer scenarios, all through a high-energy seminar approach. This CAP Certification Training | Certified Authorization Professional Training class is the product of a wide range of leading industry experts and authors, and our training materials are widely considered the best option available for CAP preparation.

In this CAP Certification Training | Certified Authorization Professional Training course, you will gain an understanding of the new authorization process and prepare for the CAP certification exam, based on the new SP 800-37 process and the new (ISC)2 Common Body of Knowledge (CBK).

Customize It!

● We can adapt this course to your group’s background and work requirements at little to no added cost.
● If you are familiar with some aspects of this CAP Certification Training | Certified Authorization Professional Training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group

Network engineers, network administrators, firewall administrators, early career security professionals, and anyone wanting a broad, vendor-neutral understanding of Information Security from a practitioner’s perspective

CAP Certification Training | Certified Authorization Professional Training Related Courses

Duration: 5 days

Objectives:

The goal of the CAP Certification Training | Certified Authorization Professional Training course is to prepare professionals for the challenging CAP exam by covering the objectives of the exam as defined in the (ISC2) common body of knowledge. CAP certification candidates are expected to have a broad range of skills across certification and accreditation concepts and functions. Our program will provide you with a quick and proven method for mastering this huge range of knowledge.

After completing this course, attendees will be able to:

• New processes and concepts, including:
• Authorization process (NIST SP 800-37, revision 1)
• Risk assessment process (NIST SP 800-30)
• Risk Management Framework (NIST SP 800-39)
• Incident response and contingency planning (NIST SP 800-65 and SP 800-34)
• Information System Continuous Monitoring(NIST SP 800-53A SP 800-137)
• Individual and organization (Office of Management and Budget, Department of Homeland Security, NIST, and National Security Agency) roles, responsibilities, requirements, and reports
• CAP certification exam preparation
• Common, system-specific, hybrid, and compensating controls
• CyberScope and CyberStat
• Security Content Automation Protocol (SCAP) and methods for media sanitization
• Effective strategies for process implementation and test-taking

Course Content:

Security Authorization
◾Security Processes and Concepts
◾Personally Identifiable Information
◾Supply Chain Security
◾Trust Relationships
◾System Development Life Cycle (SDLC)
◾Risk Management
◾Certification and Accreditation (C&A) or Authorization
◾Roles and Responsibilities
◾Authorization Evolution
◾Key Documents
◾Authorization 2010 and Beyond (SP 800-37 and CNSSI-1253)
◾RMF (SP 800-37 and SP 800-39)
◾Assessment vs. Authorization
◾Compliance vs. Governance
◾Players, Regulations, and Documents
◾OMB Circulars and Memos

Categorize Information and Information System
◾Adequate Security
◾Risk-Based Cost-Effective System Security Plan
◾Categorization
◾Capital Planning and Investment Control Process
◾Federal Enterprise Architecture (FEA)
◾Accreditation Boundaries
◾Interconnecting Information Systems

Select Security Controls
◾Specific, Common, and Hybrid Controls
◾Selecting Security Controls
◾Tailoring Controls
◾E-Authentication Assurance Levels

Implement Security Controls
◾Security Control Implementation
◾Tailoring and Compensating Controls
◾Firewalls
◾Computer Security Log Management
◾Approved Configurations, Tests, and Checklists
◾Malware Incident Prevention and Handling
◾Incident Response
◾Contingency Plans
◾Awareness, Training, and Education

Assess Security Controls
◾Security Test and Assessment
◾Vulnerability Tools and Techniques
◾Security Assessment Plan (SAP)
◾Security Assessment Report (SAR)

Authorize Information System
◾Plan of Actions and Milestones (POAM)
◾Security Authorization Package
◾Authorization
◾Authority tOperate (ATO)
◾Interim Authorization tTest (IATT)
◾Interim AT(IATO)
◾Denial of Approval tOperate (DATO)

Monitor Security Controls
◾Continuous Monitoring
◾Information Security Continuous Monitoring (ISCM)
◾Configuration Management
◾Patch and Vulnerability Management
◾Security Content Automation Protocol (SCAP)
◾Performance Measurement
◾Program Review for Information Security Management Activities (PRISMA)
◾Disposal and Media Sanitization

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment