Skip to content
Computer Science · 12th Grade

Active learning ideas

Wireless Networks and Mobile Computing

Active learning helps students grasp wireless security because it turns abstract concepts like signal broadcasting and encryption handshakes into tangible experiences. When students manipulate tools or debate real scenarios, they confront misconceptions directly, which builds durable understanding of why wireless security matters.

Common Core State StandardsCSTA: 3B-NI-03CSTA: 3B-NI-04
25–45 minPairs → Whole Class4 activities

Activity 01

Inquiry Circle45 min · Small Groups

Inquiry Circle: Protocol Security Timeline

Groups each research one wireless security protocol (WEP, WPA, WPA2, WPA3) and create a one-page summary covering: how authentication works, known vulnerabilities, and when it became obsolete or recommended. Groups present in chronological order, building a class timeline on the board that shows how each protocol responded to the failures of its predecessor.

Analyze the security vulnerabilities inherent in wireless networks compared to wired connections.

Facilitation TipDuring Collaborative Investigation: Protocol Security Timeline, assign each pair a specific protocol version to research and present its timeline placement and security improvements to the class.

What to look forPose this question to small groups: 'Imagine your school is upgrading its Wi-Fi security to WPA3. What are two benefits and two challenges this change might introduce for students and staff? Be prepared to share your group's conclusions.'

AnalyzeEvaluateCreateSelf-ManagementSelf-Awareness
Generate Complete Lesson

Activity 02

Think-Pair-Share25 min · Pairs

Think-Pair-Share: The Public Wi-Fi Dilemma

Present this scenario: a student needs to check their banking app on public Wi-Fi at a coffee shop with no password. Students individually list the risks, then pair up to rank them by severity and brainstorm mitigation strategies. Pairs share one risk and one mitigation, building a shared risk register on the board that covers both technical and behavioral responses.

Explain the trade-offs between convenience and security in mobile computing environments.

Facilitation TipDuring Think-Pair-Share: The Public Wi-Fi Dilemma, require students to cite at least one technical detail from the activity’s provided scenario cards when sharing their responses.

What to look forPresent students with three scenarios: 1) A coffee shop offering free Wi-Fi, 2) A home network with a password, 3) A corporate office network. Ask them to identify the primary security protocol likely used in each and one specific vulnerability associated with that choice.

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Formal Debate35 min · Whole Class

Formal Debate: Convenience vs. Security in School Networks

Students debate a proposal: the school should require device registration and certificate-based authentication for all Wi-Fi connections, eliminating the shared password. One side argues for security; the other argues for ease of access for guests and new devices. Students must address the specific technical mechanisms involved, not just abstract preferences.

Compare different wireless security protocols (e.g., WPA2, WPA3) and their effectiveness.

Facilitation TipDuring Structured Debate: Convenience vs. Security in School Networks, provide a scoring rubric in advance so students focus on evidence-based arguments rather than persuasive style.

What to look forOn an index card, have students write: 1) One key difference between wireless and wired network security. 2) One example of a mobile computing challenge related to network connectivity. 3) A question they still have about wireless security.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 04

Gallery Walk35 min · Small Groups

Gallery Walk: Mobile Security Threat Scenarios

Post scenario cards describing real mobile security incidents , rogue access points, evil twin attacks, cellular IMSI catchers. Students rotate and write on sticky notes what vulnerability was exploited and what countermeasure would apply. A debrief focuses on which threats are most relevant in students' daily environment and how they can protect themselves.

Analyze the security vulnerabilities inherent in wireless networks compared to wired connections.

Facilitation TipDuring Gallery Walk: Mobile Security Threat Scenarios, post guiding questions at each station to prompt students to analyze the attack vectors shown in the scenario diagrams.

What to look forPose this question to small groups: 'Imagine your school is upgrading its Wi-Fi security to WPA3. What are two benefits and two challenges this change might introduce for students and staff? Be prepared to share your group's conclusions.'

UnderstandApplyAnalyzeCreateRelationship SkillsSocial Awareness
Generate Complete Lesson

A few notes on teaching this unit

Teachers should ground lessons in concrete demonstrations rather than abstract slides. Use packet capture tools like Wireshark to show unencrypted traffic and how HTTPS hides only content, not metadata. Avoid overloading students with protocol details upfront; instead, build understanding progressively through scenario-based activities that reveal vulnerabilities naturally. Research shows that students retain security concepts better when they experience the consequences of poor design choices firsthand.

By the end of these activities, students will explain how wireless signals behave differently from wired connections, compare security protocols by their technical trade-offs, and justify security choices for different network contexts. Success looks like students using precise terminology (e.g., WPA3 SAE, evil twin) in discussions and applying their knowledge to critique network designs.


Watch Out for These Misconceptions

  • During Think-Pair-Share: The Public Wi-Fi Dilemma, watch for students assuming HTTPS alone protects all aspects of their session.

    Use the provided network capture file during this activity to show students how DNS queries, IP addresses, and unencrypted handshakes remain visible even when HTTPS is active. Have them note which data types are exposed in the packet capture.

  • During Gallery Walk: Mobile Security Threat Scenarios, watch for students believing a password-protected network isolates user traffic from others on the same SSID.

    Point students to the WPA2 handshake diagram at Station 3, which shows the shared key’s role. Have them trace how one user’s handshake could theoretically decrypt another’s traffic and compare this to WPA3’s SAE steps shown at Station 4.


Methods used in this brief