Skip to content
Computer Science · Grade 9

Active learning ideas

Ethical Hacking and Penetration Testing (Overview)

Active learning turns abstract concepts like ethical boundaries and technical procedures into tangible experiences. For ethical hacking, students need to feel the tension between curiosity and rules, and simulations make permission, consent, and consequences real in ways lectures cannot.

Ontario Curriculum ExpectationsCS.HS.CY.7CS.HS.S.14
30–50 minPairs → Whole Class4 activities

Activity 01

Case Study Analysis45 min · Pairs

Role-Play: Ethical vs. Malicious Hacker Scenarios

Divide class into pairs: one acts as an ethical hacker seeking permission, the other as a malicious one without it. Provide scenario cards with system details and vulnerabilities. Pairs perform and switch roles, then debrief on differences and ethics as a class.

Explain the difference between ethical hacking and malicious hacking.

Facilitation TipDuring Role-Play, assign roles clearly and require students to rehearse their opening line for asking permission before performing any test.

What to look forPose the following to students: 'Imagine you are hired to perform a penetration test on your school's Wi-Fi network. What are the first three ethical guidelines you would confirm before starting, and why are they important?' Facilitate a class discussion on their responses.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 02

Simulation Game50 min · Small Groups

Simulation Game: Basic Penetration Test Walkthrough

Use safe online tools like TryHackMe or paper-based network diagrams. Students in small groups follow steps: reconnaissance, scanning, gaining access ethically, and reporting. Groups present findings and recommend fixes.

Analyze the benefits of penetration testing for organizational security.

Facilitation TipIn Simulation, pause at key steps to ask students to predict what might go wrong next, making the process interactive rather than passive.

What to look forPresent students with three short scenarios: one describing ethical hacking, one describing malicious hacking, and one describing penetration testing. Ask students to label each scenario and briefly explain their reasoning, focusing on authorization and intent.

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
Generate Complete Lesson

Activity 03

Formal Debate40 min · Whole Class

Formal Debate: Benefits of Penetration Testing

Assign whole class to two sides: one argues benefits for security, the other potential risks if mishandled. Provide evidence cards with real cases. Vote and discuss ethical guidelines post-debate.

Justify the ethical guidelines that govern penetration testing activities.

Facilitation TipFor Debate, provide a timer per speaker and a visible list of rules to keep the discussion structured and respectful.

What to look forOn an index card, have students write down one key difference between ethical and malicious hacking. Then, ask them to list one benefit an organization gains from conducting penetration tests.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 04

Case Study Analysis30 min · Individual

Case Study Analysis: Real-World Tests

Individuals review anonymized case studies of penetration tests. Note steps taken, ethical checks, and outcomes. Share in small groups, justifying why guidelines were followed or breached.

Explain the difference between ethical hacking and malicious hacking.

What to look forPose the following to students: 'Imagine you are hired to perform a penetration test on your school's Wi-Fi network. What are the first three ethical guidelines you would confirm before starting, and why are they important?' Facilitate a class discussion on their responses.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teachers often start with concrete examples before abstract rules, using relatable scenarios like school Wi-Fi to ground the discussion. Avoid diving straight into technical tools; focus first on the ethical framework. Research shows students retain ethical reasoning better when they experience conflict between curiosity and responsibility firsthand.

Students should leave able to explain the difference between ethical and malicious hacking, justify why penetration tests matter, and apply ethical guidelines in a simulated environment. Success looks like clear reasoning in discussions, accurate labeling in scenarios, and thoughtful reflections in exit tickets.


Watch Out for These Misconceptions

  • During Role-Play: Ethical vs. Malicious Hacker Scenarios, watch for students who confuse the need for permission with simply announcing their intent.

    Use the role-play scripts to redirect students to verbalize specific permission wording and the purpose of the test, reinforcing that authorization must be explicit and documented.

  • During Simulation: Basic Penetration Test Walkthrough, watch for assumptions that a successful test finds everything.

    Pause the simulation at the reporting stage to ask students to reflect on what wasn't found and why, using their output to correct the misconception through direct evidence.

  • During Debate: Benefits of Penetration Testing, watch for claims that ethical hacking operates without rules.

    Provide the EC-Council guidelines document during the debate and require students to cite specific rules when justifying their positions, making the framework part of their arguments.


Methods used in this brief