| Lesson Plan |
| Grade: |
Date: 03/03/2026 |
| Subject: Information Technology IT |
| Lesson Topic: Apply wireless transmission security (WEP, WPA) |
Learning Objective/s:
- Describe the vulnerabilities of WEP and the security improvements introduced by WPA.
- Apply configuration steps to set up WEP and WPA‑PSK on a wireless router.
- Evaluate wireless security settings using a checklist and recommend enhancements for a small‑business scenario.
|
Materials Needed:
- Projector or interactive whiteboard
- Laptop with Wi‑Fi router admin access (or simulated interface)
- Printed handout of WEP/WPA comparison table
- Worksheet with configuration checklist
- Sample SSID and passphrase cards
- Internet connection for demonstration
|
Introduction:
Begin with a quick poll: Who has ever connected to a public Wi‑Fi network? Remind students that wireless signals extend beyond walls, making them vulnerable to eavesdropping. Explain that today they will explore why WEP is insecure and how WPA protects a network, and they will leave able to configure a secure wireless LAN.
|
Lesson Structure:
- Do‑Now (5') – Students list three reasons wireless networks need protection on sticky notes; share briefly. (Engage)
- Mini‑lecture (10') – Explain WEP architecture, key/IV weaknesses, using slides and diagram. (Explain)
- Guided demo (12') – Show router admin interface; walk through WEP configuration steps; students follow on their laptops. (Apply)
- Interactive comparison (8') – Compare WEP vs WPA using the comparison table; discuss integrity and key management. (Analyze)
- WPA‑PSK configuration activity (12') – Students configure WPA‑PSK on a test router, choose a strong passphrase, select TKIP/AES. (Apply)
- Security checklist challenge (8') – In pairs, use the provided checklist to audit the configured network and suggest improvements for a small‑business scenario. (Evaluate)
- Exit ticket (5') – Write one key difference between WEP and WPA and one action to improve wireless security. (Reflect)
|
Conclusion:
Summarise that WEP is obsolete and WPA (preferably WPA2/AES) provides dynamic keys and integrity checks. Ask students to submit their exit tickets and remind them to complete the homework worksheet, which asks them to design a secure wireless setup for a home office. Reinforce that regular firmware updates and strong passphrases are essential.
|