Skip to content
APhigh school

AP Cybersecurity

Learn to think like both a defender and an attacker across all 5 layers of defense-in-depth: physical spaces, networks, devices, applications, and data. You will analyze threats, evaluate defenses, and build the security mindset tested on the AP Cybersecurity exam.

5units
10topics
150questions
~4hours

Course Units

Learning objectives

  • Identify physical security vulnerabilities in organizational environments including tailgating, dumpster diving, and social engineering
  • Evaluate access control mechanisms for physical spaces including keycards, biometrics, and mantraps
  • Recommend physical security mitigations based on risk assessment and cost-benefit analysis
  • Explain how physical security integrates with the defense-in-depth strategy
  • Analyze real-world scenarios where physical security failures led to data breaches

Topics in this unit

Learning objectives

  • Analyze firewall rules and network configurations to identify security vulnerabilities
  • Explain how network segmentation and VLANs limit lateral movement of attackers
  • Evaluate IDS/IPS alerts and network logs to detect potential intrusions
  • Apply encryption protocols (TLS, IPsec, WPA3) to protect data in transit across networks
  • Compare zero-trust architecture to traditional perimeter-based security models

Learning objectives

  • Identify vulnerabilities in operating systems, firmware, and IoT devices
  • Apply hardening techniques including patch management, secure boot, and principle of least privilege
  • Evaluate endpoint detection and response (EDR) strategies for threat mitigation
  • Analyze device policies and configurations to detect misconfigurations and excess permissions
  • Explain why IoT devices present unique security challenges compared to traditional endpoints

Learning objectives

  • Identify common web application vulnerabilities from the OWASP Top 10 including injection, XSS, and broken authentication
  • Analyze application logs and error messages to detect exploitation attempts
  • Evaluate authentication and session management implementations for weaknesses
  • Recommend secure coding practices to mitigate injection and cross-site scripting attacks
  • Explain the role of input validation, output encoding, and parameterized queries in preventing attacks

Learning objectives

  • Classify data according to sensitivity levels and apply appropriate protection controls
  • Evaluate encryption and access control mechanisms for protecting data at rest and in transit
  • Analyze privacy regulations including GDPR, FERPA, and HIPAA for compliance requirements
  • Design incident response and disaster recovery plans to minimize data loss and downtime
  • Distinguish between data backup, disaster recovery, and business continuity planning