AP Cybersecurity
  • Home
  • Lessons
  • About
  • Contact

Lessons by Unit

Course Overview

Welcome to the AP Cybersecurity interactive curriculum! This course covers social engineering, network security, AI in cyber, and more. Work through the lessons at your own pace and track your progress.

  • Modern, real-world scenarios
  • Hands-on activities and quizzes
  • Accessible, student-friendly design
View Course Framework

1Introduction to Security

  • 1.0Unit 1: Introduction to Security
  • 1.1Understanding Social Engineering
  • 1.2Suspicious Wi-Fi Login
  • 1.3The Dangers of Public Wi-Fi
  • 1.4AI-Based Cybersecurity Attacks
  • 1.5Leveraging AI in Cyber Defense

2Securing Spaces

  • 2.0Unit 2: Securing Spaces
  • 2.1Cyber Foundations
  • 2.2Physical Vulnerabilities and Attacks
  • 2.3Protecting Physical Spaces
  • 2.4Detecting Physical Attacks

3Securing Networks

  • 3.0Unit 3: Securing Networks
  • 3.1Network Vulnerabilities and Attacks
  • 3.2Protecting Networks: Managerial Controls and Wireless Security
  • 3.3Protecting Networks: Segmentation
  • 3.4Protecting Networks: Firewalls
  • 3.5Detecting Network Attacks

4Securing Devices

  • 4.0Unit 4: Securing Devices
  • 4.1Device Vulnerabilities and Attacks
  • 4.2Authentication
  • 4.3Protecting Devices
  • 4.4Detecting Attacks on Devices

5Securing Applications and Data

  • 5.0Unit 5: Securing Applications and Data
  • 5.1Application and Data Vulnerabilities and Attacks
  • 5.2Protecting Applications and Data: Managerial Controls and Access Controls
  • 5.3Protecting Stored Data with Cryptography
  • 5.4Asymmetric Cryptography
  • 5.5Protecting Applications
  • 5.6Detecting Attacks on Data and Applications

AP Cybersecurity Curriculum

Made with ❤️ for students by students

This is an independent educational resource and is not affiliated with, endorsed by, or sponsored by the College Board. AP® is a trademark registered by the College Board, which is not affiliated with, and does not endorse, this website.

Quick Links

HomeLessonsAboutContact

Get in Touch

Contact form will load when visible.

© 2025 AP Cybersecurity Curriculum. All rights reserved.
Privacy PolicyTerms of Service