Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Information Technology IT
Lesson Topic: Explain network security methods (encryption, firewalls)
Learning Objective/s:
  • Describe the purpose of encryption and firewalls in protecting network data.
  • Explain how symmetric, asymmetric, and hash functions work and give common examples.
  • Compare the main types of firewalls and their rule‑setting approaches.
  • Apply key‑management concepts and firewall strategies to a simple network scenario.
  • Analyse exam‑style questions on selecting appropriate encryption or firewall solutions.
Materials Needed:
  • Projector or interactive whiteboard
  • Slide deck covering encryption algorithms and firewall types
  • Handout with key formulas, algorithm summaries, and firewall rule table
  • Sample network diagram (printed or digital)
  • Quiz/exit‑ticket sheets
  • Laptops (optional) for a quick online firewall demo
Introduction:

Begin with a short video clip showing a data breach caused by weak encryption, then ask students what safeguards they think could have prevented it. Review prior knowledge of basic data confidentiality concepts. Explain that by the end of the lesson they will be able to identify and justify appropriate encryption and firewall solutions.

Lesson Structure:
  1. Do‑Now (5'): Students list everyday examples of encryption (e.g., messaging apps) on sticky notes.
  2. Mini‑lecture (15'): Overview of symmetric vs. asymmetric encryption, key concepts, and hashing; include quick formula recap.
  3. Guided practice (10'): Walk through RSA key‑generation steps on the board, students fill a worksheet.
  4. Interactive demo (10'): Show a simple firewall rule set in a simulated network tool; discuss packet‑filtering vs. stateful inspection.
  5. Group activity (15'): Teams design a layered security plan for a small business, selecting encryption method(s) and firewall type(s); present rationale.
  6. Check for understanding (5'): Quick Kahoot quiz covering key terms and differences.
  7. Summary & exit ticket (5'): Students write one thing they will remember about encryption and one about firewalls.
Conclusion:

Recap the complementary roles of encryption (confidentiality/integrity) and firewalls (access control). Collect exit tickets to gauge understanding and assign a short homework task: research a recent real‑world cyber‑attack and identify which security method could have mitigated it.