Lesson Plan

Lesson Plan
Grade: Date: 25/02/2026
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand phishing, pharming, smishing, vishing including the methods that can be used to help prevent them
Learning Objective/s:
  • Describe the key characteristics of phishing, pharming, smishing and vishing.
  • Explain how each attack vector operates and identify common warning signs.
  • Apply at least three technical or awareness‑based prevention measures to mitigate these threats.
  • Analyse simulated messages to classify the type of attack and recommend appropriate actions.
  • Create a personal checklist for safe digital communication.
Materials Needed:
  • Projector and screen
  • Printed handout with attack definitions and checklist
  • Sample phishing email screenshots (digital)
  • Smartphones for smishing demonstration
  • Speakerphone or headset for vishing role‑play
  • Internet access for live DNS lookup
  • Worksheets for group analysis
Introduction:

Begin with a quick poll: “Have you ever received a message that seemed too urgent to be real?” Use a few student responses to highlight the prevalence of online scams. Connect this to prior lessons on safe internet use and set the success criteria: students will be able to recognise and counter four common social‑engineering attacks.

Lesson Structure:
  1. Do‑Now (5'): Examine a screenshot of a suspicious email; note red‑flag indicators.
  2. Mini‑lecture (10'): Define phishing, pharming, smishing, vishing with real‑world examples.
  3. Interactive demo (15'): Live DNS lookup, link‑hover inspection, short‑URL expansion, and a simulated smishing text and vishing call.
  4. Group analysis activity (15'): Teams receive mixed scenarios (email, SMS, phone, fake website) and identify the attack type and required preventive steps.
  5. Prevention strategies discussion (10'): Review technical controls (MFA, DNSSEC, spam filters) and user‑awareness tactics; students complete a checklist.
  6. Exit ticket (5'): Write one actionable tip they will apply immediately to stay safe online.
Conclusion:

Recap the four attack vectors and the key signs that differentiate them. Collect exit tickets to gauge understanding and assign a short homework: research a recent phishing incident and summarise how it could have been prevented using the strategies discussed.