Computer Systems Authorization Protocol (ISC2 – CAP)
Course content:

  • Risk Management Framework
  • Categorization of Information Systems
  • Selection of Security Controls
  • Security Control Implementation
  • Security Control Assessment
  • Information System Authorization
  • Monitoring of Security Controls

Click here for detailed course objectives.

Want to take this class? Let us know by clicking here.