| Lesson Plan |
| Grade: |
Date: 03/03/2026 |
| Subject: Information Technology IT |
| Lesson Topic: Understand encryption protocols (TLS/SSL, IPsec) |
Learning Objective/s:
- Describe the core security goals (confidentiality, integrity, authentication, non‑repudiation) provided by encryption protocols.
- Explain the TLS/SSL handshake sequence, key derivation and the role of cipher suites.
- Compare TLS/SSL and IPsec, highlighting their OSI layers, modes, and typical use‑cases.
- Identify common attacks on TLS/SSL and IPsec and suggest appropriate mitigations.
- Apply protocol knowledge to select the most suitable encryption solution for a given scenario.
|
Materials Needed:
- Projector and screen
- Whiteboard and markers
- Laptop with Wireshark installed
- Two virtual machines (or lab PCs) for IPsec tunnel setup
- Handout summarising TLS handshake and IKEv2 steps
- Sample X.509 certificates for TLS demo
|
Introduction:
Begin with a rapid quiz recalling confidentiality and integrity to activate prior knowledge. Briefly state that today’s success criteria are to trace a TLS handshake, outline an IPsec tunnel, and evaluate which protocol fits specific network scenarios.
|
Lesson Structure:
- Do‑now (5’) – Quick quiz on security goals and a short discussion.
- Mini‑lecture (10’) – Overview of TLS/SSL purpose, layers, and handshake diagram.
- Guided walkthrough (12’) – Step‑by‑step TLS handshake on the board; students label each message.
- Live demo (10’) – Capture a TLS handshake with Wireshark; identify ClientHello, ServerHello, etc.
- Break (5’).
- IPsec overview (10’) – Explain transport vs. tunnel mode, AH/ESP, and IKEv2 handshake.
- Lab activity (15’) – Students configure an IPsec tunnel between two VMs, capture ESP packets, and map them to IKEv2 steps.
- Consolidation (8’) – Compare TLS and IPsec, discuss common attacks (BEAST, Heartbleed, etc.) and mitigation strategies; Q&A.
|
Conclusion:
Summarise the key differences between TLS/SSL and IPsec and revisit the success criteria. For the exit ticket, ask each student to write one practical difference between the two protocols. Assign homework to research a recent real‑world vulnerability in either protocol and prepare a brief mitigation summary.
|