Activity 01
Role-Play: Attack Scenarios
Divide class into small groups. Each group draws a tactic like pretexting or baiting, assigns roles for attacker and victims, performs a 3-minute skit, then switches. Follow with a 10-minute debrief on what worked and why.
Explain how social engineering exploits human psychology to bypass security measures.
Facilitation TipFor the Role-Play activity, assign specific roles to students to ensure they embody the attacker’s tactics clearly and the victim’s reactions authentically.
What to look forPresent students with a short, fictional scenario describing a suspicious email or phone call. Ask: 'What social engineering tactic might be at play here? What specific details in the message make it suspicious? What is the safest way to respond, or not respond, to this communication?'