cropped-Artboard-1.png

Captiva Solutions, Cybersecurity Assessor (ISC2 CAP Preparation)

Assess, authorize and maintain information systems. The ISC2 Certified Authorization Professional (CAP) certification is one of the most in-demand and industry-leading cybersecurity certifications. The CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF). This course is based on the NIST Risk Management Framework (RMF) as outlined in NIST SP800-37. Students gain the knowledge and skills needed to apply cost-effective and appropriate security controls with a risk-based approach; and prepare for the ISC2 CAP exam. During this 5-day course you will learn how to maintain and authorize information systems within the NIST Risk Management Framework (RMF). Sought after by civilian, state and local governments, as well as system integrators supporting these organizations, you will leave with the knowledge and skills necessary to earn your (ISC)² CAP certification, which verifies your ability to set up the formal processes used to assess risk and establish security requirements.

Description

Assess, authorize and maintain information systems. The ISC2 Certified Authorization Professional (CAP) certification is one of the most in-demand and industry-leading cybersecurity certifications. The CAP certification is a proven way to build your career and demonstrate your expertise within the risk management framework (RMF). This course is based on the NIST Risk Management Framework (RMF) as outlined in NIST SP800-37. Students gain the knowledge and skills needed to apply cost-effective and appropriate security controls with a risk-based approach; and prepare for the ISC2 CAP exam. During this 5-day course you will learn how to maintain and authorize information systems within the NIST Risk Management Framework (RMF). Sought after by civilian, state and local governments, as well as system integrators supporting these organizations, you will leave with the knowledge and skills necessary to earn your (ISC)² CAP certification, which verifies your ability to set up the formal processes used to assess risk and establish security requirements.

Nullam quis risus eget urna mollis ornare vel eu leo. Aenean lacinia bibendum nulla sed 

Level 1

An organization must demonstrate basic cyber hygiene practices, such as ensuring employees change passwords regularly to protect Federal Contract Information (FCI). FCI is “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government.”

Level 2

An organization must have an institutionalized management plan to implement good cyber hygiene practices to safeguard CUI, including all the NIST 800-171 r2 security requirements and processes

Level 3 – Expert.

An organization must have standardized and optimized processes in place and additional enhanced practices that detect and respond to changing tactics, techniques and procedures (TTPs) of advanced persistent threats (APTs).

An APT is an adversary that possesses sophisticated levels of cyber expertise and significant resources to conduct attacks from multiple vectors. Capabilities include having resources to monitor, scan, and process data forensics.