Lesson Plan

Lesson Plan
Grade: Date: 01/12/2025
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand two-factor authentication including its purpose and function
Learning Objective/s:
  • Describe the concept and purpose of two‑factor authentication (2FA).
  • Identify and differentiate the three authentication factor categories: something you know, have, or are.
  • Explain how 2FA works, including common methods such as authenticator apps, SMS codes, and biometrics.
  • Evaluate the advantages and limitations of 2FA in a school environment.
  • Demonstrate setting up a basic 2FA method on a device or online account.
Materials Needed:
  • Projector or interactive whiteboard
  • Computer with internet access for teacher demo
  • Student laptops/tablets or smartphones
  • Printable worksheet with 2FA scenarios
  • Sample QR‑code image for authenticator‑app setup
  • Handout of backup/recovery codes
Introduction:

Start with a quick poll: “How many of you have ever received a text code when logging into an account?” Recall that passwords alone are vulnerable, so today we will explore how adding a second factor strengthens security. By the end of the lesson you will be able to describe how 2FA works, list its benefits and drawbacks, and guide peers through a simple setup.

Lesson Structure:
  1. Do‑now (5') – Students write on a sticky note whether they have used 2FA before; teacher records responses.
  2. Mini‑lecture (10') – Definition, purpose, and the three factor categories using slides and a flow‑chart diagram.
  3. Live demonstration (10') – Teacher sets up Google Authenticator on a device, showing password entry then code request.
  4. Guided practice (15') – Pairs follow a worksheet to simulate 2FA using a provided QR‑code on their own device; teacher circulates for support.
  5. Group discussion (10') – Each group lists one advantage and one limitation of 2FA on the board.
  6. Implementation planning (10') – Whole‑class brainstorm steps for rolling out 2FA in the school, noting key actions.
  7. Exit ticket (5') – Students write one key takeaway and one remaining question on a slip of paper.
Conclusion:

We reviewed how 2FA adds an extra security layer and considered its practical use in schools. Remember to store backup recovery codes safely in case the second factor is lost. For homework, set up 2FA on a personal account and bring a screenshot of the confirmation to share in the next class.