Activity 01
Role-Play: Phishing Scenarios
Pairs take turns as attacker and defender in scripted social engineering scenarios, such as fake emails or phone calls. Switch roles after 5 minutes, then debrief as a class on recognition cues and responses. Extend by having pairs create their own scenarios for others to defend.
Why is the human element often the weakest link in a cybersecurity strategy?
Facilitation TipDuring the Role-Play: Phishing Scenarios activity, assign roles so students experience both the attacker’s tactics and the victim’s decision-making process.
What to look forPresent students with short scenarios describing a potential cyber threat. Ask them to identify the type of threat (e.g., social engineering, SQL injection, DDoS) and briefly explain why. For example: 'An email arrives claiming to be from IT support, asking for your password to fix an urgent issue. What is this, and why is it dangerous?'