Level: Advanced

Certified Authorization Professional (CAP)

3 Day | Instructor Led

The UKI System Authorization Course provides a blend of lecture, exercises and quizzes that assists students in learning system authorization processes as well as preparing for the (ISC)2 Certified Authorization Professional Exam.

Inquire About
Certified Authorization Professional (CAP)

Ideal Candidates for Certified Authorization Professional (CAP) Class

Certified Authorization Professional (CAP) Prerequisites

The (CAP) is targeted at professionals with at least 2 years of experience in information systems security certification and accreditation. To achieve the (CAP) credential, you need a minimum of two years of direct full-time information systems security certification and accreditation professional experience in one or more of the seven (ISC)2 (CAP) domains.

What You'll Get in Certified Authorization Professional (CAP)

Experienced - Expert Level Instruction
UKI Developed Curriculum
CAP Common Body of Knowledge (CBK)
Daily Homework Questions
Daily Quiz Questions
Course Related Readings (Reinforcement)
Exam Study Guidance by a CAP course instructor before and after class
Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in Certified Authorization Professional (CAP)

During this training all seven domains associated with the CAP credential are covered. These domains include:

Understanding the Security Authorization of Information Systems
Categorize Information Systems
Establish the Security Control Baseline
Apply Security Controls
Assess Security Controls
Authorize Information System
Monitor Security Controls

Certified Authorization Professional (CAP) Certification

This course will assist the student in preparing for the (ISC)2 Certified Authorization Professional (CAP®) examination. The CAP credential has been approved by the U.S. Department of Defense (DoD) to meet the criteria of Directive 8570.1. This (ISC)2 credential is an objective measure of the knowledge, skills and abilities required for personnel involved in System Authorization processes. Specifically, the credential applies to professionals responsible for formalizing processes used to assess risk and establish security requirements, as well as ensure information systems possess security commensurate with the level of exposure to potential risk.

Certified Authorization Professional (CAP) Outline

1. Risk Management Framework (RMF)

2. Categorization of Information Systems

3. Selection of Security Controls

4. Security Control Implementation

5. Security Control Assessment

6. Information System Authorization

7. Monitoring of Security Controls

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

If you are ready to take your security career to the next level, Ultimate Knowledge's Certified Information Systems Security Professional (CISSP) training and certification boot camp will help get you there. You will receive instruction from our experts who possess in-depth, real-world experience as you cover all the material you need to be fully prepared for the (ISC)2 CISSP exam. Our comprehensive CISSP exam prep tools contain the industry's most relevant, up-to-date information and includes summary charts, insightful data, and practice exams. Along with our CISSP training and certification custom course material, you will receive a free copy of Shon Harris' CISSP Certification All-in-One Exam Guide, 5th Edition and a CISSP Practice Exams Book (All-in-One).



This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the (ISC)2 Common Body of Knowledge (CBK®). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes.



CISSP Information Systems Security Architecture Professional (ISSAP)



© 2017 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W