*Friday CLOSED

Timings 10.00 am - 08.00 pm

Call : 021-3455-6664, 0312-216-9325 DHA 021-35344-600, 03333808376, ISB 03333808376

ISC CAP CAP – Certified Authorization ProfessionalVersion: 4.0


Be the first to rate Certified Associate in Project Management -CAPM
Or log in to access your purchased courses
by samiya
Price: 40,000
2 Months
0 Lessons

ISC CAP

ISC CAP CAP – Certified Authorization Professional Version: 4.0

The Certified Authorization Professional (CAP) certification exam is one of the most-demanded and industry-leading IT certification.CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF).The Certified Authorization Professional (CAP) is an information security practitioner who advocates for security risk management in pursuit of information system authorization to support an organization’s mission and operations in accordance with legal and regulatory requirements.Candidates have experience includes information systems security-related work performed in pursuit of information system authorization, or work that requires security risk management knowledge and involves direct application of that knowledge.


Requirements
  • Candidates must have a minimum of 2 years cumulative work experience in 1 or more of the 7 domains of the CAP CBK.
  • However, a candidate that doesn’t have the required experience to become a CAP may become an Associate of (ISC)² by successfully passing the CAP examination.
  • The Associate of (ISC)² will then have 3 years to earn the 2 year required experience.

Course Outline
Information Security Risk Management Program

Understand the Foundation of an Organization-Wide Information Security Risk Management Program

  • Principles of information security
  • National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
  • RMF and System Development Life Cycle (SDLC) integration
  • Information System (IS) boundary requirements
  • Approaches to security control allocation
  • Roles and responsibilities in the authorization process

Understand Risk Management Program Processes

  • Enterprise program management controls
  • Privacy requirements
  • Third-party hosted Information Systems (IS)

Understand Regulatory and Legal Requirements

  • Federal information security requirements
  • Relevant privacy legislation
  • Other applicable security-related mandates

Categorization of Information Systems (IS) 

Define the Information System (IS)

  • Identify the boundary of the Information System (IS)
  • Describe the architecture
  • Describe Information System (IS) purpose and functionality

 Determine Categorization of the Information System (IS)

  • Identify the information types processed, stored, or transmitted by the Information System (IS)
  • Determine the impact level on confidentiality, integrity, and availability for each information type
  • Determine Information System (IS) categorization and document results

Selection of Security Controls

Identify and Document Baseline and Inherited Controls


Select and Tailor Security Controls

  • Determine applicability of recommended baseline
  • Determine appropriate use of overlays
  • Document applicability of security controls

Develop Security Control Monitoring Strategy


Review and Approve Security Plan (SP)


Implementation of Security Controls

Implement Selected Security Controls

  • Confirm that security controls are consistent with enterprise architecture
  • Coordinate inherited controls implementation with common control providers
  • Determine mandatory configuration settings and verify implementation (e.g., United States Government Configuration Baseline (USGCB), National Institute of Standards and Technology (NIST) checklists, Defense Information Systems Agency (DISA), Security Technical Implementation Guides (STIGs), Center for Internet Security (CIS) benchmarks)
  • Determine compensating security controls

Document Security Control Implementation

  • Capture planned inputs, expected behavior, and expected outputs of security controls
  • Verify documented details are in line with the purpose, scope, and impact of the Information System (IS)
  • Obtain implementation information from appropriate organization entities (e.g., physical security, personnel security)

Assessment of Security Controls

Prepare for Security Control Assessment (SCA)

  • Determine Security Control Assessor (SCA) requirements
  • Establish objectives and scope » Determine methods and level of effort
  • Determine necessary resources and logistics
  • Collect and review artifacts (e.g., previous assessments, system documentation, policies)
  • Finalize Security Control Assessment (SCA) plan

Conduct Security Control Assessment (SCA)

  • Assess security control using standard assessment methods
  • Collect and inventory assessment evidence

Prepare Initial Security Assessment Report (SAR)

  • Analyze assessment results and identify weaknesses
  • Propose remediation actions

Review Interim Security Assessment Report (SAR) and Perform Initial Remediation Actions

  • Determine initial risk responses
  • Apply initial remediations
  • Reassess and validate the remediated controls

Develop Final Security Assessment Report (SAR) and Optional Addendum


Authorization of Information Systems (IS) 

Develop Plan of Action and Milestones (POAM)

  • Analyze identified weaknesses or deficiencies
  • Prioritize responses based on risk level
  • Formulate remediation plans
  • Identify resources required to remediate deficiencies
  • Develop schedule for remediation activities

Assemble Security Authorization Package

  • Compile required security documentation for Authorizing Official (AO)

Determine Information System (IS) Risk

  • Evaluate Information System (IS) risk
  • Determine risk response options (i.e., accept, avoid, transfer, mitigate, share)

Make Security Authorization Decision

  • Determine terms of authorization

Continuous Monitoring 

Determine Security Impact of Changes to Information Systems (IS) and Environment

  • Understand configuration management processes
  • Analyze risk due to proposed changes
  • Validate that changes have been correctly implemented

Perform Ongoing Security Control Assessments (SCA)

  • Determine specific monitoring tasks and frequency based on the agency’s strategy » Perform security control assessments based on monitoring strategy
  • Evaluate security status of common and hybrid controls and interconnections

Conduct Ongoing Remediation Actions (e.g., resulting from incidents, vulnerability scans, audits, vendor updates)

  • Assess risk(s)
  • Formulate remediation plan(s)
  • Conduct remediation tasks

Update Documentation

  • Determine which documents require updates based on results of the continuous monitoring process

Perform Periodic Security Status Reporting

  • Determine reporting requirements

Perform Ongoing Information System (IS) Risk Acceptance

  • Determine ongoing Information System (IS)

Decommission Information System (IS)

  • Determine Information System (IS) decommissioning requirements
  • Communicate decommissioning of Information System (IS)

Who this course is for:
  • Anyone who are preparing for the exam CAP certification and knowledge.

🎥 Your FREE eLEARNING Courses (Click Here)


International Student Fee: 500USD


Flexible Class Options

  • Evening Classes | Corporate Workshops | Fast-Track
  • Week End Classes For Professionals  SAT | SUN
  • Online Classes – Live Virtual Class (L.V.C), Online Training

Related Courses

 CISCO CCNA Certified Network Associate 200-301 Exam Dumps Practice Test

CCNA Cloud Certification Training

CCDA Cisco Certified Design Associate Certification

CCNP Routing and Switching  Certification Training


KEY FEATURES

Flexible Classes Schedule

Online Classes for out of city / country students

Unlimited Learning - FREE Workshops

FREE Practice Exam

Internships Available

Free Course Recordings Videos

Register Now


Lessons

Or log in to access your purchased courses
ABOUT US

OMNI ACADEMY & CONSULTING is one of the most prestigious Training & Consulting firm, founded in 2010, under MHSG Consulting Group aim to help our customers in transforming their people and business - be more engage with customers through digital transformation. Helping People to Get Valuable Skills and Get Jobs.

Read More

Contact Us

Get your self enrolled for unlimited learning 1000+ Courses, Corporate Group Training, Instructor led Class-Room and ONLINE learning options. Join Now!
  • Head Office: A-2/3 Westland Trade Centre, Shahra-e-Faisal PECHS Karachi 75350 Pakistan Call 0213-455-6664 WhatsApp 0334-318-2845, 0336-7222-191, +92 312 2169325
  • Gulshan Branch: A-242, Sardar Ali Sabri Rd. Block-2, Gulshan-e-Iqbal, Karachi-75300, Call/WhatsApp 0213-498-6664, 0331-3929-217, 0334-1757-521, 0312-2169325
  • ONLINE INQUIRY: Call/WhatsApp +92 312 2169325, 0334-318-2845, Lahore 0333-3808376, Islamabad 0331-3929217, Saudi Arabia 050 2283468
  • DHA Branch: 14-C, Saher Commercial Area, Phase VII, Defence Housing Authority, Karachi-75500 Pakistan. 0213-5344600, 0337-7222-191, 0333-3808-376
  • info@omni-academy.com
  • FREE Support | WhatsApp/Chat/Call : +92 312 2169325
WORKING HOURS

  • Monday10.00am - 7.00pm
  • Tuesday10.00am - 7.00pm
  • Wednesday10.00am - 7.00pm
  • Thursday10.00am - 7.00pm
  • FridayClosed
  • Saturday10.00am - 7.00pm
  • Sunday10.00am - 7.00pm
WhatsApp Us