Activity 01
Role-Play: Breach Simulation
Assign roles like incident coordinator, analyst, and communicator to small groups. Present a scenario such as a phishing email detection, then guide them through steps: identify signs, contain spread by isolating devices, eradicate malware, and recover data. Groups present their response plan to the class.
Analyze the critical steps in a cybersecurity incident response plan.
Facilitation TipDuring the Breach Simulation, assign clear roles (detective, containment specialist, communicator) so every student sees how their part fits into the larger response.
What to look forPresent students with a scenario: 'A phishing email was opened, and a user clicked a malicious link.' Ask them to list the first three actions they would take according to an incident response plan, and briefly explain why each action is important.