Lesson Plan

Lesson Plan
Grade: Date: 25/02/2026
Subject: Information Technology IT
Lesson Topic: Identify malware types (trojan, worms, spyware, ransomware)
Learning Objective/s:
  • Describe the key characteristics and propagation methods of Trojans, worms, spyware, and ransomware.
  • Compare the primary goals, typical symptoms, and impact on confidentiality, integrity, and availability for each malware type.
  • Evaluate preventive measures and recommend appropriate controls for each category.
  • Explain how user behaviour influences malware risk and how education can mitigate it.
Materials Needed:
  • Projector and screen
  • Whiteboard and markers
  • Printed handouts with the malware comparison table
  • Laptops/computers with internet access for each pair of students
  • Sample malware case‑study worksheets
  • Antivirus/anti‑spyware demo software (demo mode)
Introduction:

Begin with a quick video clip showing a ransomware attack making headlines to capture interest. Ask students what they already know about malicious software and record responses. Explain that today they will be able to identify four major malware types and articulate how each is prevented, which will be the success criteria for the lesson.

Lesson Structure:
  1. Do‑Now (5'): Students list any malware they have heard of on a sticky note; share a few examples.
  2. Direct Instruction (10'): Teacher presents concise definitions, key characteristics, and propagation methods for each malware type using the projector and handout.
  3. Guided Practice (12'): In pairs, students examine a case‑study worksheet and match symptoms to the correct malware type; teacher circulates to check understanding.
  4. Interactive Demo (8'): Show a safe anti‑malware scan demo highlighting how Trojans, worms, spyware, and ransomware are detected and quarantined.
  5. Check for Understanding (5'): Quick quiz (Kahoot or show‑of‑hands) on prevention measures for each type.
  6. Summary & Reflection (5'): Whole‑class discussion summarising differences and reinforcing the success criteria.
Conclusion:

Recap the four malware categories, their propagation methods, and key preventive actions. Ask each student to write one “take‑away” on an exit ticket and hand it in. For homework, assign a short research task: find a recent real‑world example of one of the malware types and suggest three mitigation steps.