• 708.689.0131
  • Contact us
  • Login
Infosec Logo
  • Infosec Logo
  • Products
  • Solutions
  • Resources
  • Company
  • Product overview
  • Infosec IQ logo Security awareness & culture
  • Infosec Skills logo On-demand training & cyber ranges
  • Infosec Skills Live Boot Camps logo On-demand training & cyber ranges
  • Infosec IQ overview
  • Security awareness training
  • Phishing simulator
  • Reporting & assessments
  • Integrations & automation
  • Global administration
  • Browse all training
  • Pricing & features
  • Demo
  • Infosec Skills overview
  • Role-guided training
  • Infosec Skills Teams
  • Cyber ranges & labs
  • Certifications & CPEs
  • Skill assessments
  • Browse all training
  • Pricing & features
  • Book a meeting
  • Live boot camps
  • Infosec Institute certifications
  • DoD 8570 certifications
  • Get team boot camp pricing
  • View boot camp schedule
  • Book a meeting
  • Pre-built training plans
  • Compliance, industry & role-based training
  • Custom education
  • Personalized learning
  • Languages
  • Gamified learning
  • 1000+ phishing templates
  • Simulation types
  • Phishing email reporter
  • Dashboard reports
  • Security culture survey
  • Assessments
  • Learner analytics
  • Learner management
  • Threat response orchestration
  • Integrations
  • 52 NICE Work Roles
  • SOC Analyst
  • Cloud Security Engineer
  • Security Manager
  • ICS Security Practitioner
  • Security Engineer
  • Penetration Tester
  • Digital Forensics Analyst
  • Information Risk Analyst
  • Security Architect
  • Secure Coder
  • Boot camp overview
  • CISSP Boot Camp
  • Security+ Boot Camp
  • Ethical Hacking Boot Camp
  • CCNA Dual Cert Boot Camp
  • CASP+ Boot Camp
  • CCSP Boot Camp
  • CISM Boot Camp
  • CySA+ Boot Camp
  • PMP Boot Camp
  • Browse all boot camps
Choose Your Own Adventure

Security awareness games by Infosec

Click to Play

On-demand training for every cybersecurity role

Download Catalog

Certification training from industry experts

Get Pricing
  • Solutions overview
  • By organization type
  • By need
  • For business teams
  • For government & contractor teams
  • For MSPs & resellers
  • Security awareness
  • Phishing simulation
  • Technical skill development
  • IT certification
  • Compliance & framework
  • CMMC certification

    2021 IT & Security Talent Pipeline Study

    Download Now
    • Cyber Work
    • Webcasts
    • Case studies
    • Reports & whitepapers
    • Blog
    • Community
    • Infosec Inspire
    • Free tools
    • Cyber Work Podcast
    • Cyber Work Applied
    • Infosec Insiders
    • TechExams
    • YouTube
    • LinkedIn
    • Facebook
    • Twitter
    • Phishing Risk Test
    • Security awareness ROI calculator
    • Security awareness training plans
    • Security awareness buyer’s guide

      Cyber Work Podcast

      New cybersecurity career conversations every week

      Listen Now
      • About us
      • Events & webcasts
      • Careers
      • Scholarships & awards
      • Infosec Gives
      • Infosec Gives Partner Program
      • About us
      • Leadership
      • Newsroom
      • Recognition
      • Industry alliances
      • Infosec Hall of Fame
      • Infosec Security Awareness Awards
      • Infosec Accelerate Scholarship Program

        We’re hiring!

        Join a team dedicated to making a difference.

        Get To Know Us

        (ISC)² CAP® Training Boot Camp

        Learn how to maintain and authorize information systems within the NIST Risk Management Framework (RMF). You’ll leave this boot camp with the knowledge and domain expertise needed to pass the Certified Authorization Professional (CAP) exam the first time you take it.

        ★★★★☆
        4.2
        (775 ratings)
        View Pricing Book a Boot Camp
        cap-boot-camp

        Earn your CAP, guaranteed!

        • Three days of expert, live CAP training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($599 value!)
        • 1-year access to all boot camp video replays and materials
        • Pre-study learning path
        • Knowledge Transfer Guarantee

        Course objectives

        This boot camp prepares you to pass the (ISC)² CAP exam, which covers seven domain areas required for information system authorization practitioners:

        • Information security risk management program
        • Categorization of information systems
        • Selection of security controls
        • Implementation of security controls
        • Assessment of security controls
        • Authorization of information systems
        • Continuous monitoring

        View full course schedule

        Training overview

        Infosec’s CAP Boot Camp teaches you best practices, policies and procedures used to authorize and maintain information systems. You’ll learn how to use the RMF to support your organization’s operations while complying with legal and regulatory requirements.

        The CAP certification is sought after by civilian, state and local governments, as well as system integrators supporting these organizations. You’ll leave with the knowledge and skills necessary to earn your (ISC)² CAP certification, which verifies your ability to set up the formal processes used to assess risk and establish security requirements.

        What you'll learn

        • Understanding the purpose of information systems security authorization
        • Defining systems authorization
        • Describing and decide when systems authorization is employed
        • Defining roles and responsibilities
        • Understanding the legal and regulatory requirements for A&A
        • Initiating the authorization process
        • Establishing authorization boundaries
        • Determining security categorization
        • Performing initial risk assessment
        • Selecting and refining security control
        • Documenting security control
        • Performing certification phase
        • Assessing security control
        • Documenting results
        • Conducting final risk assessment
        • Generating and presenting an authorization report
        • Performing continuous monitoring
        • Monitoring security controls
        • Monitoring and assessing changes that affect the information system
        • Performing security impact assessment as needed
        • Documenting and monitoring results of impact assessments
        • Maintaining system’s documentation (e.g., POA&M, SSP, interconnection agreements)

        Who should attend

        • Information system security officers
        • Senior system managers
        • System administrators
        • IT and information security professionals who use the RMF
        • Anyone looking to learn more about the NIST-based information systems security authorization process

        Prerequisites

        In order to obtain the CAP certification, you must have at least two years of paid work experience in at least one of the seven domains listed in the (ISC)² CAP Common Body of Knowledge (CBK).

        However, you can become an Associate of (ISC)² by passing the exam without the required work experience.

        Everything you need to earn your CAP

        • Three days of expert, live CAP training
        • Exam Pass Guarantee
        • Exam voucher
        • Unlimited practice exam attempts
        • 100% Satisfaction Guarantee
        • Free annual Infosec Skills subscription ($599 value!)
        • 1-year access to all boot camp video replays and materials
        • Pre-study learning path
        • Knowledge Transfer Guarantee
        Everything you need to earn your CAP
        View Pricing

        Exam Pass Guarantee

        We guarantee you’ll pass your exam on the first attempt. Learn more. 

        CAP training schedule

        Infosec’s CAP materials are always up to date and synchronized with the latest (ISC)² exam objectives. Our industry-leading curriculum and expert instructors have led to the highest pass rates in the industry. More than 93% of Infosec students pass their certification exams on their first attempt.

        • Before your boot camp
          • Start learning now. You’ll get immediate access to all the content in Infosec Skills, the moment you enroll. Prepare for your live boot camp, uncover your knowledge gaps and maximize your training experience.

        • During your boot camp
          • Introduction
            Risk Management Framework

            • Understanding the Risk Management Framework
            • Categorization of information system
            • Selection of security controls
            • Security control implementation
            • Security control assessment
            • Information system authorization
            • Monitoring of security controls

            RMF steps

            • Risk Management Framework processes
            • Categorize information system
              • Information system
              • System security plan
              • Categorize a system
              • National security system
              • Privacy activities
              • System boundaries
              • Register system
            • Select security controls
              • Establish the security control baseline
              • Common controls and security controls inheritance
              • Risk assessment as part of the Risk Management Framework (RMF)
            • Implement security controls
              • Implement selected security controls
              • Tailoring of security controls
              • Document security control implementation
            • Assess security controls
              • Prepare for security control assessment
              • Establish security control assessment plan (SAP)
              • Determine security control effectiveness and perform testing
              • Develop initial security assessment report (SAR)
              • Perform initial remediation actions
              • Develop final security assessment report and addendum
            • Authorize information system
              • Develop plan of action and milestones (POAM)
              • Assemble security authorization package
              • Determine risk
              • Determine the acceptability of risk
              • Obtain security authorization decision
            • Monitor security state
              • Determine security impact of changes to system and environment
              • Perform ongoing security control assessments
              • Conduct ongoing remediation actions
              • Update key documentation
              • Perform periodic security status reporting
              • Perform ongoing risk determination and acceptance
              • Decommission and remove system
        • After your boot camp
          • Your boot camp includes a 1-year subscription to Infosec Skills, so you can take additional time to prepare for your exam, get a head start on your next certification goal or start earning CPEs.

        Free CAP training resources

        CAP Resource Hub

        Explore our CAP resource hub to learn all about the CAP, including exam information, study resources, salary data, job outlook and more.

        See Resources

        The business impact of cyber risk

        KPMG reports 68% of CEOs believe a cyber-attack is a matter of when — not if. How is your organization preparing to mitigate cyber risk in the new year? Join David Kruse, technology risk consultant, Justin Webb, CIPP-certified attorney and Jeff McCollum, crisis response and public relations professional for strategies to help you discuss cybersecurity at the board level, assess and mitigate cyber risk at your organization, and reduce the business impact of cyber incidents through planning and response.

        Listen Now

        Assessing Vulnerabilities

        Check out different ways to detect vulnerabilities and mitigation strategies.

        See Resources

        Find your boot camp

        Take the course online?
        Learn more about online
        866.471.0059
        • Today
        • Next week
        • Next month
        See additional dates

        Sign up

        Enroll in a boot camp

          See additional dates
          Infosec logo

          Products

          Infosec IQ Security awareness, culture & phishing simulator Infosec Skills Hands-on skill development & boot camps

          Resources

          Cyber Work Blog Infosec Inspire Events & webcasts

          Company

          Contact us About Infosec Careers Newsroom Partners
          • ©2022 Infosec Institute, Inc.
            • Trademarks
            • Privacy Policy

          Infosec, part of Cengage Group

          We use cookies to personalize your experience and optimize site functionality. Accept Cookie settings
          Privacy & Cookies Policy

          Infosec cookie notice

          We use cookies to help understand your needs, optimize website functionality and give you the best experience possible. Use this policy to understand how, when and where cookies are stored on your device. 

          Want to know more? Contact [email protected].
          Necessary
          Always Enabled
          This type of cookie helps keep our website functioning. They provide access to account-based features and other secure areas of our site, and do not store information about you that could be used for marketing. This category of cookies cannot be disabled.
          Analytics
          Google Analytics cookies help us understand how visitors use our site. All data collected from Google Analytics is anonymized (including your IP address) and stored by Google on U.S. servers.
          Marketing
          We use this type of cookie to optimize our marketing campaigns. Marketing cookies are delivered by our database when you visit our site, complete a form or open email from us. Information stored in this cookie includes personal information like your name and what pages you view on our site.
          Save & Accept