Activity 01
Phishing Hunt: Email Simulation
Provide sample emails, some phishing, some legitimate. In pairs, students identify red flags like poor grammar or fake sender addresses, then justify choices on a shared checklist. Conclude with a class vote on trickiest examples.
Evaluate the effectiveness of common cybersecurity best practices for individuals.
Facilitation TipIn Checklist Design Workshop, walk students through a shared rubric so they know how their final checklist will be judged.
What to look forProvide students with a scenario: 'You receive an email asking you to click a link to verify your bank account details immediately, or your account will be locked. What are two specific actions you should take or avoid, and why?'