Activity 01
Stations Rotation: Threat Identification Stations
Prepare four stations with sample phishing emails, malware descriptions, hacker motivation articles, and defence checklists. Students rotate every 10 minutes, annotating examples and discussing traits in their groups. End with a class share-out of key findings.
Explain why hackers target individuals rather than just large corporations.
Facilitation TipDuring Threat Identification Stations, circulate with a checklist of common phishing signs so students practice using the same criteria experts rely on.
What to look forProvide students with three short scenarios describing online interactions. Ask them to identify which scenario represents a phishing attempt, explain why, and suggest one action they would take to stay safe.