Unit 3: Securing Networks

Unit Overview

Unit 3 focuses on network security, one of the most critical domains in cybersecurity. Students learn about common network vulnerabilities and attack methods, as well as the various technical and managerial controls used to protect network infrastructure. The unit emphasizes layered network defense strategies, including wireless security, network segmentation, firewall deployment, and intrusion detection systems.

Students engage with professional scenarios that simulate real-world network security challenges faced by cybersecurity professionals in organizational environments.

Lessons in This Unit

3.1 Network Vulnerabilities and Attacks

Identify and analyze common network-based attacks and vulnerabilities that threaten organizational network infrastructure.

3.2 Protecting Networks: Managerial Controls and Wireless Security

Learn about policy-based network security controls and specific measures for securing wireless network infrastructure.

3.3 Protecting Networks: Segmentation

Explore network segmentation strategies and how dividing networks into smaller segments can limit the impact of security breaches.

3.4 Protecting Networks: Firewalls

Understand firewall technologies, configurations, and their role in controlling network traffic and preventing unauthorized access.

3.5 Detecting Network Attacks

Learn about network monitoring tools and techniques used to identify and respond to malicious network activity.

Course Skills Emphasized

  • Skill 1.A: Identify, with and without the support of AI, vulnerabilities, threats, and attack methods, and explain how they generate risk.
  • Skill 1.B: Determine ways adversaries exploit vulnerabilities to compromise an asset.
  • Skill 2.A: Identify security controls, and explain how they mitigate risks.
  • Skill 2.B: Determine layered security controls that address vulnerabilities.
  • Skill 3.A: Identify methods for monitoring systems, and explain how they detect attacks.
  • Skill 3.B: Determine strategies and methods to detect attacks.

Key Topics Covered

  • Network architecture and infrastructure security
  • Common network attacks (man-in-the-middle, denial of service, packet sniffing)
  • Wireless network security protocols and vulnerabilities
  • Network segmentation and isolation strategies
  • Firewall types, rules, and configuration
  • Intrusion detection and prevention systems (IDS/IPS)
  • Network access control (NAC) systems
  • Virtual private networks (VPNs)
  • Network monitoring and traffic analysis
  • Security information and event management (SIEM) systems

AP Cybersecurity Curriculum

Made with ❤️ for students by students

This is an independent educational resource and is not affiliated with, endorsed by, or sponsored by the College Board. AP® is a trademark registered by the College Board, which is not affiliated with, and does not endorse, this website.

Get in Touch

Contact form will load when visible.

© 2025 AP Cybersecurity Curriculum. All rights reserved.