CyberProtex
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact
Picture

ISC2 CAP
Certified Authorization Professional 
Bootcamp 40 CPEs 


 In Person or Virtual Training

Group Training Available 


Contact us for more information

Contact US
ISC2 – CAP
ISC2 - CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies and procedures.
 
Prerequisites:Earning the CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF). The CAP is the only certification under the DoD8570 mandate that aligns with each RMF step. It shows employers you have the advanced technical skills and knowledge to authorize and maintain information systems within the RMF using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
 
Learning Outcomes:The CAP is ideal for IT, information security, and information assurance practitioners and contractors who use the RMF in: The U.S. federal government, such as the U.S. Department of State or Department of Defense The military Civilian roles, such as federal contractors Local governments Private sector organizations
 
NICE Framework Connections:
  • Securely Provision
  • Operate and maintain
  • Protect and Defend
  • Oversee and Govern
Knowledge Skills and Abilities (KSAs) Mapping:The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Specialty Area details within the interactive National Cybersecurity Workforce Framework.
  • Risk Management
  • Software Development
  • Systems Administration
  • Vulnerability Assessment and Management
  • Systems Analysis
  • Cybersecurity Management
  • Program/Project Management and Acquisition

Course Outline:
  • Risk Management Framework Lifecycle
  • RMF Process
  • Selection of Security Controls with eMASS
  • Implementation of Security Controls – Tools
  • Assessing with the Utility Belt
  • Authorization of Information Systems
  • Continuous Monitoring
Bootcamp Includes
Picture
PLEASE NOTE:  In some cases, vouchers for exams may only be obtained by the individual taking the exam. In those cases, we reserve the right to refund the cost of the voucher to the person taking the course from us with the intent they will take the refund and pay for the voucher themselves.

​
Exam voucher must be used (exam taken) within one year of bootcamp.

All courses are subject to cancellation and/or rescheduling due to insufficient enrollment or unforeseen circumstances, as per CyberProtex Policy.  Additionally, if for some unforeseen reason an instructor cannot be available at any particular time, we will notify the attendees of the class as soon as possible and allow a makeup time for the missed instruction due to the instructors' absence.

Check out our YouTube Channel for CAP Topics

Picture
CyberProtex, LLC - 2012-2023
ContactUs@CyberProtex.com
256-401-7072
Picture
  • SERVICES
    • Managed Services >
      • Security Operations Center
      • Continuous Monitoring
      • Endpoint Protection
    • Security and Compliance >
      • CMMC Certified Services
      • Assessments
      • Phishing Simulations
      • Incident Response
  • SOFTWARE
    • Azure Migrations >
      • Azure Security and Federation
      • Identity and Access Management
    • Dynamics 365
    • SQL Management
    • DevSecOps
    • Application Security
    • Software Products >
      • Vulnerability Genius Software
      • eMASS Simulator Software
      • ICS - SCADA Simulations
      • CyberLMS Software
  • Training
    • Certification Courses
    • CMMC-Summit
    • Cyber Workshops
    • CyberPatriot Competition
    • Summer Camps
    • ICS - SCADA Training
    • YouTube Channel
    • Online Courses
  • About Us
    • Careers
    • Partners
    • Corporate-Offices >
      • Training Center
    • Community Outreach
  • Contact