Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Information Technology IT
Lesson Topic: Apply wireless transmission security (WEP, WPA)
Learning Objective/s:
  • Describe the vulnerabilities of WEP and the security improvements introduced by WPA.
  • Apply configuration steps to set up WEP and WPA‑PSK on a wireless router.
  • Evaluate wireless security settings using a checklist and recommend enhancements for a small‑business scenario.
Materials Needed:
  • Projector or interactive whiteboard
  • Laptop with Wi‑Fi router admin access (or simulated interface)
  • Printed handout of WEP/WPA comparison table
  • Worksheet with configuration checklist
  • Sample SSID and passphrase cards
  • Internet connection for demonstration
Introduction:

Begin with a quick poll: Who has ever connected to a public Wi‑Fi network? Remind students that wireless signals extend beyond walls, making them vulnerable to eavesdropping. Explain that today they will explore why WEP is insecure and how WPA protects a network, and they will leave able to configure a secure wireless LAN.

Lesson Structure:
  1. Do‑Now (5') – Students list three reasons wireless networks need protection on sticky notes; share briefly. (Engage)
  2. Mini‑lecture (10') – Explain WEP architecture, key/IV weaknesses, using slides and diagram. (Explain)
  3. Guided demo (12') – Show router admin interface; walk through WEP configuration steps; students follow on their laptops. (Apply)
  4. Interactive comparison (8') – Compare WEP vs WPA using the comparison table; discuss integrity and key management. (Analyze)
  5. WPA‑PSK configuration activity (12') – Students configure WPA‑PSK on a test router, choose a strong passphrase, select TKIP/AES. (Apply)
  6. Security checklist challenge (8') – In pairs, use the provided checklist to audit the configured network and suggest improvements for a small‑business scenario. (Evaluate)
  7. Exit ticket (5') – Write one key difference between WEP and WPA and one action to improve wireless security. (Reflect)
Conclusion:

Summarise that WEP is obsolete and WPA (preferably WPA2/AES) provides dynamic keys and integrity checks. Ask students to submit their exit tickets and remind them to complete the homework worksheet, which asks them to design a secure wireless setup for a home office. Reinforce that regular firmware updates and strong passphrases are essential.