Not a Student?
Go to AP Central for resources for teachers, administrators, and coordinators.
About the Course
Ready to level up your tech skills and become a digital defender? In AP Cybersecurity you’ll explore how to protect data, devices, and networks from real-world cyber threats. You’ll tackle hands-on challenges and learn how to solve problems like a pro, while building skills that can lead to exciting college opportunities and in-demand careers. This course is for you if you’re interested in technology and keeping the online world safe.
Skills You'll Learn
Analyzing risk
Mitigating risk
Detecting attacks
Collaboration
Equivalency and Prerequisites
College Course Equivalent
AP Cybersecurity is equivalent to an introductory college-level cybersecurity course.
Recommended Prerequisites
None
Your Future Starts Now
AP can lead to a wide range of careers and college majors.
About the Units
The course content outlined below is organized into commonly taught units of study that provide one possible sequence for the course. Your teacher may choose to organize the course content differently based on local priorities and preferences.
Course Content
Unit 1: Introduction to Security
You’ll discover how adversaries compromise systems through weak authentication and social engineering techniques. Then you’ll learn how to strengthen authentication to protect yourself.
Topics may include:
- Social Engineering
- The Impact of AI in Cybersecurity
- Types of Cyber Adversaries
Unit 2: Securing Physical Spaces
You’ll learn adversarial thinking to identify vulnerabilities, threats, and mitigations, and apply these concepts to physical spaces. You’ll also learn how to detect physical breaches.
Topics may include:
- Physical Vulnerabilities and Attacks
- Protecting Physical Spaces
- Detecting Physical Attacks
Unit 3: Securing Networks
You’ll study the benefits of network segmentation and learn how to place and configure firewalls to manage network traffic. You’ll also learn how to analyze network log files to find possible indicators of compromise (IoCs).
Topics may include:
- Network Vulnerabilities and Attacks
- Managerial Controls
- Wireless Network Security
- Network Segmentation
- Firewalls
- Detecting Network Attacks
Unit 4: Securing Devices
You’ll learn how to protect devices from adversaries and how to analyze log files for indicators of compromise (IoCs).
Topics may include:
- Device Vulnerabilities and Attacks
- Authentication
- Anti-malware
- Detecting Attacks on Devices
Unit 5: Securing Applications and Data
You’ll learn how to use access controls and encryption to protect the confidentiality and integrity of data both in storage and while it is being transmitted. You’ll also learn how to identify evidence of common application attacks in log files.
Topics may include:
- Application and Data Vulnerabilities and Attacks
- Access Controls
- Cryptography
- Detecting Attacks on Applications and Data
Credit and Placement
Search AP Credit Policies
Find colleges that grant credit and/or placement for AP Exam scores in this and other AP courses.