CAP Exam Syllabus

CAP PDF, CAP Dumps, CAP VCE, Authorization Professional Questions PDF, ISC2 Authorization Professional VCEUse this quick start guide to collect all the information about ISC2 CAP Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the ISC2 Authorization Professional (CAP) exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual ISC2 Certified Authorization Professional (CAP) certification exam.

The ISC2 CAP certification is mainly targeted to those candidates who want to build their career in Cybersecurity domain. The ISC2 Certified Authorization Professional (CAP) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of ISC2 CAP.

ISC2 CAP Exam Summary:

Exam Name ISC2 Certified Authorization Professional (CAP)
Exam Code CAP
Exam Price $599 (USD)
Duration 180 mins
Number of Questions 125
Passing Score 700/1000
Schedule Exam Pearson VUE
Sample Questions ISC2 CAP Sample Questions
Practice Exam ISC2 CAP Certification Practice Exam

ISC2 CAP Exam Syllabus Topics:

Topic Details

Information Security Risk Management Program (15%)

Understand the Foundation of an Organization-Wide Information Security Risk Management Program - Principles of information security
- National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)
- RMF and System Development Life Cycle (SDLC) integration
- Information System (IS) boundary requirements
- Approaches to security control allocation
- Roles and responsibilities in the authorization process
Understand Risk Management Program Processes - Enterprise program management controls
- Privacy requirements
- Third-party hosted Information Systems (IS)
Understand Regulatory and Legal Requirements - Federal information security requirements
- Relevant privacy legislation
- Other applicable security-related mandates

Categorization of Information Systems (IS) (13%)

Define the Information System (IS) - Identify the boundary of the Information System (IS)
- Describe the architecture
- Describe Information System (IS) purpose and functionality
Determine Categorization of the Information System (IS) - Identify the information types processed, stored, or transmitted by the Information System (IS)
- Determine the impact level on confidentiality, integrity, and availability for each information type
- Determine Information System (IS) categorization and document results

Selection of Security Controls (13%)

Identify and Document Baseline and Inherited Controls  
Select and Tailor Security Controls - Determine applicability of recommended baseline
- Determine appropriate use of overlays
- Document applicability of security controls
Develop Security Control Monitoring Strategy  
Review and Approve Security Plan (SP)  

Implementation of Security Controls (15%)

Implement Selected Security Controls - Confirm that security controls are consistent with enterprise architecture
- Coordinate inherited controls implementation with common control providers
- Determine mandatory configuration settings and verify implementation (e.g., United States Government Configuration Baseline (USGCB), National Institute of Standards and Technology (NIST) checklists, Defense Information Systems Agency (DISA), Security Technical Implementation Guides (STIGs), Center for Internet Security (CIS) benchmarks)
- Determine compensating security controls
Document Security Control Implementation - Capture planned inputs, expected behavior, and expected outputs of security controls
- Verify documented details are in line with the purpose, scope, and impact of the Information System (IS)
- Obtain implementation information from appropriate organization entities (e.g., physical security, personnel security

Assessment of Security Controls (14%)

Prepare for Security Control Assessment (SCA) - Determine Security Control Assessor (SCA) requirements
- Establish objectives and scope
- Determine methods and level of effort
- Determine necessary resources and logistics
- Collect and review artifacts (e.g., previous assessments, system documentation, policies)
- Finalize Security Control Assessment (SCA) plan
Conduct Security Control Assessment (SCA) - Assess security control using standard assessment methods
- Collect and inventory assessment evidence
Prepare Initial Security Assessment Report (SAR) - Analyze assessment results and identify weaknesses
- Propose remediation actions
Review Interim Security Assessment Report (SAR) and Perform Initial Remediation Actions - Determine initial risk responses
- Apply initial remediations
- Reassess and validate the remediated controls
Develop Final Security Assessment Report (SAR) and Optional Addendum  

Authorization of Information Systems (IS) (14%)

Develop Plan of Action and Milestones (POAM) - Analyze identified weaknesses or deficiencies
- Prioritize responses based on risk level
- Formulate remediation plans
- Identify resources required to remediate deficiencies
- Develop schedule for remediation activities
Assemble Security Authorization Package - Compile required security documentation for Authorizing Official (AO)
Determine Information System (IS) Risk - Evaluate Information System (IS) risk
- Determine risk response options (i.e., accept, avoid, transfer, mitigate, share)
Make Security Authorization Decision - Determine terms of authorization

Continuous Monitoring (16%)

Determine Security Impact of Changes to Information Systems (IS) and Environment - Understand configuration management processes
- Analyze risk due to proposed changes
- Validate that changes have been correctly implemented
Perform Ongoing Security Control Assessments (SCA) - Determine specific monitoring tasks and frequency based on the agency’s strategy
- Perform security control assessments based on monitoring strategy
- Evaluate security status of common and hybrid controls and interconnections
Conduct Ongoing Remediation Actions (e.g., resulting from incidents, vulnerability scans, audits, vendor updates) - Assess risk(s)
- Formulate remediation plan(s)
- Conduct remediation tasks
Update Documentation - Determine which documents require updates based on results of the continuous monitoring process
Perform Periodic Security Status Reporting - Determine reporting requirements
Perform Ongoing Information System (IS) Risk Acceptance - Determine ongoing Information System (IS)
Decommission Information System (IS) - Determine Information System (IS) decommissioning requirements
- Communicate decommissioning of Information System (IS)

To ensure success in ISC2 CAP certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for Authorization Professional (CAP) exam.

Rating: 4.8 / 5 (231 votes)