ISC2 – CAP
ISC2 - CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies and procedures.
Prerequisites:Earning the CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF). The CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Learning Outcomes:The CAP is ideal for IT, information security, and information assurance practitioners and contractors who use the RMF in: The U.S. federal government, such as the U.S. Department of State or Department of Defense The military Civilian roles, such as federal contractors Local governments Private sector organizations
NICE Framework Connections:
Course Outline:
ISC2 - CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies and procedures.
Prerequisites:Earning the CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF). The CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Learning Outcomes:The CAP is ideal for IT, information security, and information assurance practitioners and contractors who use the RMF in: The U.S. federal government, such as the U.S. Department of State or Department of Defense The military Civilian roles, such as federal contractors Local governments Private sector organizations
NICE Framework Connections:
- Securely Provision
- Operate and maintain
- Protect and Defend
- Oversee and Govern
- Risk Management
- Software Development
- Systems Administration
- Vulnerability Assessment and Management
- Systems Analysis
- Cybersecurity Management
- Program/Project Management and Acquisition
Course Outline:
- Risk Management Framework Lifecycle
- RMF Process
- Selection of Security Controls with eMASS
- Implementation of Security Controls – Tools
- Assessing with the Utility Belt
- Authorization of Information Systems
- Continuous Monitoring
PLEASE NOTE: In some cases, vouchers for exams may only be obtained by the individual taking the exam. In those cases, we reserve the right to refund the cost of the voucher to the person taking the course from us with the intent they will take the refund and pay for the voucher themselves.
Exam voucher must be used (exam taken) within one year of bootcamp.
All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy. Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.
Exam voucher must be used (exam taken) within one year of bootcamp.
All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy. Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.