Certified Authorisation Professional (CAP) Certification and Training

Nivå: Foundation
Snittbetyg: 4,5/5 4,52/5 Based on 93 Reviews

This official (ISC) Certified Authorisation Professional (CAP) course prepares you for the CAP exam.

The Certified Authorisation Professional (CAP®) is an information security practitioner who advocates for security risk management in pursuit of information system authorisation to support an organization’s mission and operations in accordance with legal and regulatory requirements.


  • Official (ISC)² curriculum
  • After-course instructor coaching benefit

Du kommer lära dig att:

  • Information Security Risk Management Program
  • Scope of the Information System
  • Selection and Approval of Security and Privacy Controls
  • Implementation of Security and Privacy Controls
  • Assessment/Audit of Security and Privacy Controls
  • Authorization/Approval of Information System
  • Continuous Monitoring

Välj den utbildningsform som passar dig bäst


I klass & Live, Online-utbildning

  • 5-day instructor-led training course
  • One-on-one after course instructor coaching
  • Pay later by invoice -OR- at the time of checkout by credit card
  • Exam Voucher Included 



  • Använd denna eller någon annan utbildning i ditt företag
  • Fullskalig programutveckling
  • Levereras när, var och hur du vill
  • Blandade utbildningsmodeller
  • Skräddarsytt innehåll
  • Coaching av ett expertteam

Anpassa kurs och innehåll efter teamets behov

Kontakta oss

Utveckla dig och ditt team med anpassade eller öppna kurser alternativt e-learning

Learning Tree erbjuder kundanpassad utbildning hos er, öppna kurser i Stockholm, London eller Washington, möjlighet att delta via våra Anywhere centers (Malmö, Göteborg, Linköping, Stockholm eller Borlänge) eller olika former av e-learning med lärarstöd. Läs mer på www.learningtree.se/priser .

I klass & Live, Online-utbildning

Note: This course runs for 5 dagar

  • 13 - 17 dec 9:00 - 16:30 GMT Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 14 - 18 mar 9:00 - 16:30 GMT Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 6 - 10 jun 9:00 - 16:30 BST Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 5 - 9 sep 9:00 - 16:30 BST Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 25 - 29 okt 15:00 - 22:30 CCST Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 6 - 10 dec 15:00 - 22:30 CCET Washington, DC / Online (AnyWare) Washington, DC / Online (AnyWare) Boka Din Kursplats

  • 31 jan - 4 feb 15:00 - 22:30 CCET Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

  • 6 - 10 jun 15:00 - 22:30 CCST Washington, DC / Online (AnyWare) Washington, DC / Online (AnyWare) Boka Din Kursplats

  • 8 - 12 aug 15:00 - 22:30 CCST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Important CAP Certification Course Information

  • Who Should Attend

    The CAP is ideal for IT, information security and information assurance practitioners and contractors who use the RMF in:

    • The U.S. federal government, such as the U.S. Department of State or the Department of Defence (DoD)
    • The military
    • Civilian roles, such as federal contractors
    • Local governments
    • Private sector organisations
  • Certification Information

    To qualify for the CAP certification, you must have:

    • A minimum of two years cumulative, paid, full-time work experience
    • In one or more of the seven domains of the CAP Common Body of Knowledge (CBK)

    To maintain certification, you must:

    • Earn and post a minimum of 20 (ISC)2 CPE credits per year
    • Comply with (ISC)2's Code of Professional Ethics
  • Earn (ISC)2 CPEs

    As one of only 12 (ISC)2 CPE Submitters worldwide, Learning Tree can submit courses on your behalf to (ISC)2 for CPE credit. (ISC)2 members can earn Group A credits for attending any of our cybersecurity courses, and Group B General Education credits for any other Learning Tree course they attend.

    Or (ISC)2 members can submit CPE credits directly to the CPE portal in the Members section of the (ISC)2 website.

CAP Certification Course Outline

  • Domain 1: Information Security Risk Management Program

    1.1 Understand the foundation of an organisation information security risk management program » Principles of information security 
    • Risk management frameworks (e.g., National Institute of Standards and Technology (NIST), cyber security framework, Control Objectives for Information and Related Technology (COBIT), International Organisation for Standardization (ISO) 27001, International Organisation for Standardization (ISO) 31000)
    • System Development Life Cycle (SDLC)
    • Information system boundary requirements
    • Security controls and practises
    • Roles and responsibilities in the authorization/approval process
    1.2 Understand risk management program processes 
    • Select program management controls
    • Privacy requirements
    • Determine third-party hosted information systems
    • Understand regulatory and legal requirements
    • Familiarise with governmental, organisational and international regulatory security and privacy requirements (e.g., International Organisation for Standardization (ISO) 27001, Federal Information Security Modernization Act (FISMA), Federal Risk and Authorisation Management Program (FedRAMP), General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA))
    • Familiarise with other applicable security-related mandates
  • Domain 2: Scope of the Information System

    2.1 Define the information system 
    • Determine the scope of the information system
    • Describe the architecture (e.g., data flow, internal and external interconnections)
    • Describe information system purpose and functionality
    2.2 Determine categorization of the information system 
    • Identify the information types processed, stored or transmitted by the information system
    • Determine the impact level on confidentiality, integrity, and availability for each information type (e.g., Federal Information Processing Standards (FIPS) 199, International Organisation for Standardization/ International Electrotechnical Commission (ISO/IEC) 27002, data protection impact assessment)
    • Determine information system categorization and document results
  • Domain 3: Selection and Approval of Security and Privacy Controls

    3.1 Identify and document baseline and inherited controls  3.2 Select and tailor controls to the system 
    • Determine applicability of recommended baseline and inherited controls
    • Determine appropriate use of control enhancements (e.g., security practises, overlays, countermeasures)
    • Document control applicability

    3.3 Develop continuous control monitoring strategy (e.g., implementation, timeline, effectiveness) 

    3.4 Review and approve security plan/Information Security Management System (ISMS)

  • Domain 4: Implementation of Security and Privacy Controls

     4.1 Implement selected controls 
    • Determine mandatory configuration settings and verify implementation in accordance with current industry standards (e.g. propriate organisation entities (e.g., physical security, personnel security, privacy)
  • Domain 5: Assessment/Audit of Security and Privacy Controls

    5.1 Prepare for assessment/audit
    • Determine assessor/auditor requirements
    • Establish objectives and scope
    • Determine methods and level of effort
    • Determine necessary resources and logistics
    • Collect and review artifacts (e.g., previous assessments/audits, system documentation, policies)
    • Finalise the assessment/audit plan
    5.2 Conduct assessment/audit 
    • Collect and document assessment/audit evidence
    • Assess/audit implementation and validate compliance using approved assessment methods (e.g., interview, test and examine)
    5.3 Prepare the initial assessment/audit report 
    • Analyse assessment/audit results and identify vulnerabilities
    • Propose remediation actions
    5.4 Review initial assessment/audit report and perform remediation actions 
    • Determine risk responses
    • Apply remediations
    • Reassess and validate the remediated controls

    5.5 Develop final assessment/audit report 

    5.6 Develop remediation plan 

    • Analyse identified residual vulnerabilities or deficiencies
    • Prioritise responses based on risk level
    • Identify resources (e.g. financial, personnel, and technical) and determine the appropriate timeframe/ schedule required to remediate deficiencies
  • Domain 6: Authorisation/Approval of Information System

    6.1 Compile security and privacy authorization/approval documents 
    • Compile required security and privacy documentation to support authorization/approval decision by the designated official
    6.2 Determine information system risk 
    • Evaluate information system risk
    • Determine risk treatment options (i.e., accept, avoid, transfer, mitigate, share)
    • Determine residual risk
    6.3 Authorize/approve information system 
    • Determine terms of authorization/approval
  • Domain 7: Continuous Monitoring

    7.1 Determine impact of changes to information system and environment 
    • Identify potential threat and impact to operation of information system and environment
    • Analyse risk due to proposed changes accounting for organisational risk tolerance » Approve and document proposed changes (e.g., Change Control Board (CCB), technical review board)
    • Implement proposed changes
    • Validate changes have been correctly implemented
    • Ensure change management tasks are performed
    7.2 Perform ongoing assessments/audits based on organisational requirements 
    • Monitor network, physical and personnel activities (e.g., unauthorised assets, personnel and related activities)
    • Ensure vulnerability scanning activities are performed
    • Review automated logs and alerts for anomalies (e.g., security orchestration, automation and response)

    7.3 Review supply chain risk analysis monitoring activities (e.g., cyber threat reports, agency reports, news reports) 

    7.4 Actively participate in response planning and communication of a cyber event 

    • Ensure response activities are coordinated with internal and external stakeholders
    • Update documentation, strategies and tactics incorporating lessons learned

    7.5 Revise monitoring strategies based on changes to industry developments introduced through legal, regulatory, supplier, security and privacy updates 

    7.6 Keep designated officials updated about the risk posture for continuous authorization/approval 

    • Determine ongoing information system risk
    • Update risk register, risk treatment and remediation plan
    7.7 Decommission information system 
    • Determine information system decommissioning requirements
    • Communicate decommissioning of information system
    • Remove information system from operations


CAP Certification Training FAQs

  • What is the Certified Authorisation Professional (CAP) Certification?

    The Certified Authorisation Professional certification covers the RMF in great detail and is the only security certification under the DoD8570 Mandate that aligns to each of the RMF steps. /p>

  • How do I take the CAP Certification exam?

    A minimum of two years cumulative, paid, full-time work experience and in one or more of the seven domains of the CAP Common Body of Knowledge (CBK)

  • Can I become an (ISC)² Certified Authorisation Professional online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class, online, and on demand.

Questions about which training is right for you?

call 08-506 668 00

Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Washington, DC / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Washington, DC / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

Hur föredrar du att bli kontaktad:

Please Choose a Language

Canada - English

Canada - Français