Skip to content

Cybersecurity BasicsActivities & Teaching Strategies

Active learning turns abstract cybersecurity concepts into concrete experiences that students can relate to. When Year 5 students role-play phishing attempts or test password strength, they move beyond listening to actively applying knowledge in situations they might face online every day.

Year 5Computing4 activities20 min40 min

Learning Objectives

  1. 1Identify common types of online threats, such as viruses and phishing attempts.
  2. 2Compare and contrast strong and weak password characteristics.
  3. 3Explain the risks associated with clicking on suspicious links or opening unknown attachments.
  4. 4Design a personal set of rules for maintaining online safety and protecting personal information.

Want a complete lesson plan with these objectives? Generate a Mission

30 min·Pairs

Role-Play: Phishing Scenarios

Prepare cards with fake emails containing suspicious links or requests. In pairs, one student reads the email aloud while the other decides if it is safe and explains why. Pairs then switch roles and share decisions with the class for group voting on safety.

Prepare & details

Explain the dangers of clicking on suspicious links or attachments.

Facilitation Tip: During the Phishing Scenarios role-play, give each student a character card with a clear but ambiguous message so they experience uncertainty firsthand.

Setup: Groups at tables with case materials

Materials: Case study packet (3-5 pages), Analysis framework worksheet, Presentation template

AnalyzeEvaluateCreateDecision-MakingSelf-Management
25 min·Small Groups

Simulation Game: Password Strength Challenge

Provide worksheets with password examples. Small groups rate them for strength, then create and test their own against class criteria like length and character mix. The strongest team password wins a badge; discuss failures to reinforce rules.

Prepare & details

Differentiate between a strong password and a weak password.

Facilitation Tip: For the Password Strength Challenge, have students work in pairs to test each other’s passwords against a mock cracker tool to reveal vulnerabilities.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
40 min·Small Groups

Collaborative Problem-Solving: Design Safety Rules Poster

In small groups, brainstorm rules for computer safety based on unit threats. Groups illustrate one rule each on a shared poster, present to the class, and vote on the top five to display in the ICT suite.

Prepare & details

Design a set of rules for keeping your computer and personal information safe online.

Facilitation Tip: When designing the Safety Rules Poster, assign one safety rule per small group so each student contributes a clear, illustrated guideline.

Setup: Groups at tables with problem materials

Materials: Problem packet, Role cards (facilitator, recorder, timekeeper, reporter), Problem-solving protocol sheet, Solution evaluation rubric

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
20 min·Whole Class

Simulation Game: Virus Spread Relay

Use props like 'infected' cards passed via 'downloads'. Whole class relays show how viruses spread if attachments are opened. Pause to discuss prevention steps like scanning files before opening.

Prepare & details

Explain the dangers of clicking on suspicious links or attachments.

Facilitation Tip: In the Virus Spread Relay, use colored paper slips to track how quickly a 'virus' spreads when students share documents without scanning them.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making

Teaching This Topic

Teach cybersecurity through guided inquiry rather than lecture. Start with relatable scenarios—like a fake game login page—then let students uncover why it’s risky. Research shows that when students experience the consequences of unsafe behavior in a safe setting, they retain strategies longer. Avoid overwhelming them with technical jargon; focus on observable behaviors like checking sender addresses or recognizing spelling mistakes in links.

What to Expect

By the end of these activities, students will confidently identify risks, explain why certain actions are unsafe, and articulate clear rules for protecting themselves and their devices. Successful learning shows in their ability to critique real-world scenarios and justify their choices during discussions and peer reviews.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring the Role-Play: Phishing Scenarios, watch for students who assume antivirus software alone will protect them.

What to Teach Instead

During the Role-Play: Phishing Scenarios, pause the scenario after each message and ask the class to identify missing clues like mismatched email addresses or urgent language that suggests a scam. Reinforce that software is one layer, but human judgment is critical.

Common MisconceptionDuring the Game: Password Strength Challenge, watch for students who believe a long password like 'ilovechocolate' is strong enough.

What to Teach Instead

During the Game: Password Strength Challenge, have students enter their passwords into a mock cracker that reveals how long it would take to guess. Guide them to see that mixing letters, numbers, and symbols like '!L0v3Ch0c!' changes the outcome dramatically.

Common MisconceptionDuring the Simulation: Virus Spread Relay, watch for students who assume phishing only affects adults.

What to Teach Instead

During the Simulation: Virus Spread Relay, immediately follow the activity with a reflection where students share how the 'virus' spread affected their accounts or data, connecting the simulation directly to risks they face when sharing devices at home.

Assessment Ideas

Exit Ticket

After the Game: Password Strength Challenge, provide two sample passwords and ask students to write one sentence explaining why one is stronger than the other and list two characteristics of a strong password.

Discussion Prompt

After the Role-Play: Phishing Scenarios, present a scenario and ask students what dangers they see and what steps they should take before clicking any link.

Quick Check

During the Collaborative: Design Safety Rules Poster, show students several icons or short descriptions of online actions and ask them to give a thumbs up for safe actions and a thumbs down for risky ones, explaining their reasoning for at least two.

Extensions & Scaffolding

  • Challenge early finishers to create a short comic strip showing a phishing attack and how to respond.
  • Scaffolding for struggling learners: Provide sentence starters like 'This email is suspicious because...' and pre-printed safe/unsafe icons for sorting.
  • Deeper exploration: Invite a local cybersecurity professional to discuss how they help people stay safe online and answer student questions.

Key Vocabulary

VirusA type of malicious software that can spread from one computer to another, often damaging files or disrupting computer operations.
PhishingA fraudulent attempt to obtain sensitive information like usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
PasswordA secret word or phrase that must be used to gain admission to something, such as a computer system or online account.
Suspicious LinkA web address that may lead to a harmful website or download malware, often disguised to look legitimate.

Ready to teach Cybersecurity Basics?

Generate a full mission with everything you need

Generate a Mission