APhigh school
AP Cybersecurity
Learn to think like both a defender and an attacker across all 5 layers of defense-in-depth: physical spaces, networks, devices, applications, and data. You will analyze threats, evaluate defenses, and build the security mindset tested on the AP Cybersecurity exam.
5units
10topics
150questions
~4hours
Course Units
Learning objectives
- Identify physical security vulnerabilities in organizational environments including tailgating, dumpster diving, and social engineering
- Evaluate access control mechanisms for physical spaces including keycards, biometrics, and mantraps
- Recommend physical security mitigations based on risk assessment and cost-benefit analysis
- Explain how physical security integrates with the defense-in-depth strategy
- Analyze real-world scenarios where physical security failures led to data breaches
Topics in this unit
Learning objectives
- Analyze firewall rules and network configurations to identify security vulnerabilities
- Explain how network segmentation and VLANs limit lateral movement of attackers
- Evaluate IDS/IPS alerts and network logs to detect potential intrusions
- Apply encryption protocols (TLS, IPsec, WPA3) to protect data in transit across networks
- Compare zero-trust architecture to traditional perimeter-based security models
Topics in this unit
Learning objectives
- Identify vulnerabilities in operating systems, firmware, and IoT devices
- Apply hardening techniques including patch management, secure boot, and principle of least privilege
- Evaluate endpoint detection and response (EDR) strategies for threat mitigation
- Analyze device policies and configurations to detect misconfigurations and excess permissions
- Explain why IoT devices present unique security challenges compared to traditional endpoints
Topics in this unit
Learning objectives
- Identify common web application vulnerabilities from the OWASP Top 10 including injection, XSS, and broken authentication
- Analyze application logs and error messages to detect exploitation attempts
- Evaluate authentication and session management implementations for weaknesses
- Recommend secure coding practices to mitigate injection and cross-site scripting attacks
- Explain the role of input validation, output encoding, and parameterized queries in preventing attacks
Topics in this unit
Learning objectives
- Classify data according to sensitivity levels and apply appropriate protection controls
- Evaluate encryption and access control mechanisms for protecting data at rest and in transit
- Analyze privacy regulations including GDPR, FERPA, and HIPAA for compliance requirements
- Design incident response and disaster recovery plans to minimize data loss and downtime
- Distinguish between data backup, disaster recovery, and business continuity planning
Topics in this unit