Activity 01
Role-Play: Phishing Encounters
Pair students as attacker and defender. Attacker crafts and delivers a phishing script via email or call; defender practices verification steps like checking URLs and pausing before clicking. Switch roles, then discuss tactics in pairs.
Why is the human element often the weakest link in cybersecurity?
Facilitation TipDuring the Role-Play, assign clear character roles (e.g., attacker, victim, observer) and give each observer a specific red-flag checklist to guide feedback.
What to look forProvide students with a sample phishing email. Ask them to identify at least three red flags in the email and explain why each is a warning sign. Collect these as students leave the class.