| Lesson Plan |
| Grade: |
Date: 01/12/2025 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand the differences between strong and weak passwords |
Learning Objective/s:
- Describe the key characteristics of strong and weak passwords.
- Explain why strong passwords are essential for network security.
- Compare strong versus weak passwords using a feature‑by‑feature chart.
- Apply best‑practice guidelines to create and manage strong passwords.
- Evaluate password choices for compliance with security standards.
|
Materials Needed:
- Projector and screen
- Whiteboard and markers
- Printed handout with password comparison table
- Laptops/tablets with internet access
- Password‑manager demo (e.g., Bitwarden)
- Sticky notes for quick password‑creation activity
|
Introduction:
Begin with a brief news clip about a recent data breach caused by weak passwords to hook students. Ask learners what they already know about network security and passwords. Outline today’s success criteria: students will be able to identify strong versus weak passwords, explain their impact on networks, and create secure passwords using best‑practice techniques.
|
Lesson Structure:
- Do‑Now (5'): Students write down one password they use and discuss its strengths/weaknesses.
- Mini‑lecture (10'): Present characteristics of strong and weak passwords with the comparison table.
- Interactive comparison activity (15'): In pairs, students match example passwords to “strong” or “weak” categories on sticky notes.
- Password creation workshop (15'): Teach passphrase technique; students craft three strong passphrases.
- Password‑manager demonstration (10'): Show how to store and generate unique passwords securely.
- Quick quiz (5'): Kahoot or paper quiz on key concepts.
- Exit ticket (5'): Write one actionable tip they will use to improve their passwords.
|
Conclusion:
Recap the differences between strong and weak passwords and why they matter for protecting network resources. Collect exit tickets to gauge understanding and assign homework: create three strong passwords (or passphrases) for personal accounts and document how they meet each security criterion.
|