Skip to content
Computing · Year 5

Active learning ideas

Cybersecurity Basics

Active learning turns abstract cybersecurity concepts into concrete experiences that students can relate to. When Year 5 students role-play phishing attempts or test password strength, they move beyond listening to actively applying knowledge in situations they might face online every day.

National Curriculum Attainment TargetsKS2: Computing - Online Safety
20–40 minPairs → Whole Class4 activities

Activity 01

Case Study Analysis30 min · Pairs

Role-Play: Phishing Scenarios

Prepare cards with fake emails containing suspicious links or requests. In pairs, one student reads the email aloud while the other decides if it is safe and explains why. Pairs then switch roles and share decisions with the class for group voting on safety.

Explain the dangers of clicking on suspicious links or attachments.

Facilitation TipDuring the Phishing Scenarios role-play, give each student a character card with a clear but ambiguous message so they experience uncertainty firsthand.

What to look forProvide students with two sample passwords, one strong and one weak. Ask them to write one sentence explaining why one is stronger than the other and list two characteristics of a strong password.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 02

Simulation Game25 min · Small Groups

Simulation Game: Password Strength Challenge

Provide worksheets with password examples. Small groups rate them for strength, then create and test their own against class criteria like length and character mix. The strongest team password wins a badge; discuss failures to reinforce rules.

Differentiate between a strong password and a weak password.

Facilitation TipFor the Password Strength Challenge, have students work in pairs to test each other’s passwords against a mock cracker tool to reveal vulnerabilities.

What to look forPresent a scenario: 'You receive an email from a company you shop with, asking you to click a link to confirm your account details due to a security issue.' Ask students: 'What are the potential dangers here? What steps should you take before clicking any link?'

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
Generate Complete Lesson

Activity 03

Collaborative Problem-Solving40 min · Small Groups

Collaborative Problem-Solving: Design Safety Rules Poster

In small groups, brainstorm rules for computer safety based on unit threats. Groups illustrate one rule each on a shared poster, present to the class, and vote on the top five to display in the ICT suite.

Design a set of rules for keeping your computer and personal information safe online.

Facilitation TipWhen designing the Safety Rules Poster, assign one safety rule per small group so each student contributes a clear, illustrated guideline.

What to look forShow students several icons or short descriptions of online actions (e.g., downloading a game from an unknown site, opening an email attachment from a stranger, logging into a school account). Ask them to give a thumbs up for safe actions and a thumbs down for risky ones, explaining their reasoning for at least two.

ApplyAnalyzeEvaluateCreateRelationship SkillsDecision-MakingSelf-Management
Generate Complete Lesson

Activity 04

Simulation Game20 min · Whole Class

Simulation Game: Virus Spread Relay

Use props like 'infected' cards passed via 'downloads'. Whole class relays show how viruses spread if attachments are opened. Pause to discuss prevention steps like scanning files before opening.

Explain the dangers of clicking on suspicious links or attachments.

Facilitation TipIn the Virus Spread Relay, use colored paper slips to track how quickly a 'virus' spreads when students share documents without scanning them.

What to look forProvide students with two sample passwords, one strong and one weak. Ask them to write one sentence explaining why one is stronger than the other and list two characteristics of a strong password.

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Teach cybersecurity through guided inquiry rather than lecture. Start with relatable scenarios—like a fake game login page—then let students uncover why it’s risky. Research shows that when students experience the consequences of unsafe behavior in a safe setting, they retain strategies longer. Avoid overwhelming them with technical jargon; focus on observable behaviors like checking sender addresses or recognizing spelling mistakes in links.

By the end of these activities, students will confidently identify risks, explain why certain actions are unsafe, and articulate clear rules for protecting themselves and their devices. Successful learning shows in their ability to critique real-world scenarios and justify their choices during discussions and peer reviews.


Watch Out for These Misconceptions

  • During the Role-Play: Phishing Scenarios, watch for students who assume antivirus software alone will protect them.

    During the Role-Play: Phishing Scenarios, pause the scenario after each message and ask the class to identify missing clues like mismatched email addresses or urgent language that suggests a scam. Reinforce that software is one layer, but human judgment is critical.

  • During the Game: Password Strength Challenge, watch for students who believe a long password like 'ilovechocolate' is strong enough.

    During the Game: Password Strength Challenge, have students enter their passwords into a mock cracker that reveals how long it would take to guess. Guide them to see that mixing letters, numbers, and symbols like '!L0v3Ch0c!' changes the outcome dramatically.

  • During the Simulation: Virus Spread Relay, watch for students who assume phishing only affects adults.

    During the Simulation: Virus Spread Relay, immediately follow the activity with a reflection where students share how the 'virus' spread affected their accounts or data, connecting the simulation directly to risks they face when sharing devices at home.


Methods used in this brief