Activity 01
Role-Play: Phishing Scenarios
Divide class into attackers and defenders. Attackers craft fake emails or calls using pretexting. Defenders identify red flags and respond safely. Debrief as whole class to share strategies.
Explain why the human element is often the weakest link in a security system.
Facilitation TipDuring Role-Play: Phishing Scenarios, assign clear roles and provide example scripts so students can focus on the psychology of manipulation, not improvisation.
What to look forProvide students with three short scenarios describing online interactions. Ask them to identify which scenario, if any, represents a social engineering attack, name the specific tactic used, and explain why it is a threat.