Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Information Technology IT
Lesson Topic: Understand encryption protocols (TLS/SSL, IPsec)
Learning Objective/s:
  • Describe the core security goals (confidentiality, integrity, authentication, non‑repudiation) provided by encryption protocols.
  • Explain the TLS/SSL handshake sequence, key derivation and the role of cipher suites.
  • Compare TLS/SSL and IPsec, highlighting their OSI layers, modes, and typical use‑cases.
  • Identify common attacks on TLS/SSL and IPsec and suggest appropriate mitigations.
  • Apply protocol knowledge to select the most suitable encryption solution for a given scenario.
Materials Needed:
  • Projector and screen
  • Whiteboard and markers
  • Laptop with Wireshark installed
  • Two virtual machines (or lab PCs) for IPsec tunnel setup
  • Handout summarising TLS handshake and IKEv2 steps
  • Sample X.509 certificates for TLS demo
Introduction:

Begin with a rapid quiz recalling confidentiality and integrity to activate prior knowledge. Briefly state that today’s success criteria are to trace a TLS handshake, outline an IPsec tunnel, and evaluate which protocol fits specific network scenarios.

Lesson Structure:
  1. Do‑now (5’) – Quick quiz on security goals and a short discussion.
  2. Mini‑lecture (10’) – Overview of TLS/SSL purpose, layers, and handshake diagram.
  3. Guided walkthrough (12’) – Step‑by‑step TLS handshake on the board; students label each message.
  4. Live demo (10’) – Capture a TLS handshake with Wireshark; identify ClientHello, ServerHello, etc.
  5. Break (5’).
  6. IPsec overview (10’) – Explain transport vs. tunnel mode, AH/ESP, and IKEv2 handshake.
  7. Lab activity (15’) – Students configure an IPsec tunnel between two VMs, capture ESP packets, and map them to IKEv2 steps.
  8. Consolidation (8’) – Compare TLS and IPsec, discuss common attacks (BEAST, Heartbleed, etc.) and mitigation strategies; Q&A.
Conclusion:

Summarise the key differences between TLS/SSL and IPsec and revisit the success criteria. For the exit ticket, ask each student to write one practical difference between the two protocols. Assign homework to research a recent real‑world vulnerability in either protocol and prepare a brief mitigation summary.