CAP Certification Boot Camps

Request Onsite

CAP Certification Boot Camps

Enroll in Countrywide Training’s ISC2 CAP boot camp class and prepare to get certified in just five days of bootcamp-style training. A certified instructor teaches the course, covering topics such as security authorization, categorization, security controls, security assessments, plans of action and milestones, and security monitoring. This course helps you to understand the new authorization process (SP 800-37) and the new (ISC)2 Common Body of Knowledge both of which play a prominent role in the CAP exam.

This ISC2 CAP certification training includes books as well as practice exams. In addition to classroom lectures, you’ll prepare for the exam by utilizing the practice exams. These exams help you become more comfortable with the exam’s format as well as highlight any subject areas that need additional studies.

Effectively Apply Cost-Effective and Appropriate Security Controls

After taking the CAP boot camp, you should be thoroughly prepared to take and pass your certification exam. However, if you do not pass it on the first try and would like to reinforce your knowledge, you may retake the course for free within 12 months (save your books).


This course requires at least two years of IT security experience (NIST, OMB, or DoD FISMA) along with experience working with IS directives and standards that cover security control, risk management, authorization, security policy, or auditing processes.

Who Should Attend

This five-day training camp is designed for ISC2 CAP candidates who are preparing for the CAP certification exam. In addition to exam candidates, the training is also ideal for those who must comply with Federal Information Security Management Act requirements as well as senior IS officers, IS officers, systems managers, systems administrators, information assurance professionals, project managers, and other professionals interested in IT system security.

Class Outline
  • 1.0 Security Authorization
  • 2.0 Categorize Information and Information System
  • 3.0 Select Security Controls
  • 4.0 Implement Security Controls
  • 5.0 Assess Security Controls
  • 6.0 Authorize Information System
  • 7.0 Monitor Security Controls
Request Onsite