Computer Systems Authorization Protocol (ISC2 – CAP)
Course content:
- Risk Management Framework
- Categorization of Information Systems
- Selection of Security Controls
- Security Control Implementation
- Security Control Assessment
- Information System Authorization
- Monitoring of Security Controls
Click here for detailed course objectives.
Want to take this class? Let us know by clicking here.