Activity 01
Role-Play: Phishing Hunt
Distribute printed mock emails and websites to pairs. Students list three phishing indicators per item, such as fake links or pressure tactics, then swap with another pair for verification. Groups report top red flags to the class.
Design a strategy for creating and managing secure passwords.
Facilitation TipFor the Phishing Hunt, assign roles like ‘hacker’ and ‘user’ to keep the simulation active and focused on specific red flags.
What to look forPresent students with 3-4 example emails. Ask them to circle any suspicious elements (e.g., generic greetings, urgent requests, odd sender addresses) and write one sentence explaining why each is a potential phishing attempt.