Activity 01
Role-Play: Phishing Attack Simulation
Pairs create phishing emails using templates, then swap and identify red flags like urgent language or suspicious links. Discuss defences such as verifying senders. Debrief as a class on common tactics.
Is the greatest threat to a network's security the software or the human user?
Facilitation TipDuring the phishing simulation, assign each student a role—attacker, victim, or observer—to ensure all perspectives are engaged.
What to look forProvide students with three short scenarios describing potential cyber threats. Ask them to identify which scenario represents a social engineering attack, name the specific tactic used (e.g., phishing, baiting), and explain why it is a threat.