Activity 01
Pairs Challenge: Strong Password Design
Pairs list weak passwords like 'password' or '1234' and create strong ones using a checklist for letters, numbers, and symbols. They swap with another pair to test crackability. Class votes on the strongest examples.
Explain why passwords are important for keeping information safe.
Facilitation TipDuring the Pairs Challenge, circulate with a timer visible so pairs feel the pressure of creating a password within 3 minutes to mimic real urgency.
What to look forPresent students with a list of 5 passwords (e.g., 'password123', 'Fluffy!', 'MyDogMax', 'Tr33H0us3!', '1998'). Ask them to circle the weak passwords and explain in one sentence why each circled password is weak.
ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson→· · ·
Activity 02
Small Groups: Risky Chat Role-Plays
Groups receive scenario cards, such as a stranger asking for home address in a game chat. They act out safe refusals and report to police role. Debrief best responses as a class.
Design a strong password and explain why it is strong.
Facilitation TipIn Risky Chat Role-Plays, assign each group a specific scenario so all students practice different types of risky interactions.
What to look forPose the question: 'Imagine a friend asks for your password to your favorite game. What are two reasons why you should not share it?' Facilitate a brief class discussion, noting student responses on the board.
ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson→· · ·
Activity 03
Whole Class: Password Cracking Relay
Divide class into teams. Teacher calls weak passwords; first student guesses, tags next. Teams discuss why they cracked quickly and redesign stronger versions.
Discuss the risks of sharing personal information online.
Facilitation TipFor the Password Cracking Relay, assign roles clearly so students rotate through guessing, recording, and encouraging to keep energy high.
What to look forGive each student a slip of paper. Ask them to write down one example of personal information they should not share online and one tip for creating a strong password.
ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson→· · ·
Activity 04
Individual: My Safety Poster
Students draw rules like 'Never share my address' and invent a strong password mnemonic. Display posters and explain choices to a partner.
Explain why passwords are important for keeping information safe.
Facilitation TipWhen students design My Safety Posters, provide markers and large paper to let creativity reinforce memory.
What to look forPresent students with a list of 5 passwords (e.g., 'password123', 'Fluffy!', 'MyDogMax', 'Tr33H0us3!', '1998'). Ask them to circle the weak passwords and explain in one sentence why each circled password is weak.
ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
Generate Complete Lesson→A few notes on teaching this unit
Teach this topic by letting students fail safely within activities. Research shows that experiencing the speed of a password crack or the awkwardness of an online scam sticks better than warnings alone. Avoid lecturing about risks; instead, let students uncover them through guided simulations. Keep language concrete—focus on actions like ‘mix letters and numbers’ rather than abstract concepts like ‘cyber threats.’
Successful learning shows when students can explain why a password is weak, refuse to share personal details in role-plays, and apply safety tips in new situations. They should leave with clear examples of what to do and what to avoid online.
Watch Out for These Misconceptions
During Pairs Challenge, watch for students who think any password is fine as long as it is kept secret.
After students create their passwords, have them swap with another pair and attempt to crack each other’s passwords in two minutes using only guessing. This shows how weak passwords fail quickly.
During Risky Chat Role-Plays, watch for students who assume online friends are always trustworthy.
Assign one student in each group to play the role of a stranger asking for personal details. After the role-play, ask the group to identify which requests were risky and why.
During Password Cracking Relay, watch for students who think apps and websites protect data automatically.
After the relay, hold a brief discussion: ‘What would happen if a website we use got hacked?’ Have students brainstorm ways users can protect themselves beyond relying on the app.
Methods used in this brief