Activity 01
Role-Play Simulation: Phishing Defense
Divide class into attackers and defenders. Attackers craft realistic phishing emails using templates. Defenders identify red flags, report, and suggest countermeasures. Debrief as whole class on successes and failures.
How can developers build systems that are resilient to human error?
Facilitation TipDuring the Role-Play Simulation: Phishing Defense, assign roles clearly so students experience both the attacker's tactics and the defender's hesitation.
What to look forPresent students with three short scenarios. For each, ask them to identify the primary cybersecurity threat (phishing, SQL injection, MitM) and briefly explain why. Example: 'An email asks you to click a link to verify your bank account details, or your account will be locked.' Ask: 'What threat is this, and what makes it that threat?'