Lesson Plan

Lesson Plan
Grade: Date: 01/12/2025
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand scanning the data/software when downloading
Learning Objective/s:
  • Describe why scanning downloaded files is essential for system security.
  • Identify common malware threats encountered during downloads.
  • Demonstrate the step‑by‑step scanning process using antivirus software.
  • Evaluate best‑practice guidelines for safe downloading and verification.
  • Apply a quick‑reference checklist to decide when to scan, verify, and update.
Materials Needed:
  • Projector or interactive whiteboard
  • Computer lab with internet access
  • Installed antivirus/anti‑malware program (e.g., Windows Defender, Malwarebytes)
  • Sample safe test files for download
  • Printed quick‑reference checklist handout
  • Worksheet for threat‑identification activity
Introduction:

Start with a brief story about a recent ransomware incident that began with a harmless‑looking download, prompting students to consider hidden risks. Ask learners to recall any personal experiences where a download caused problems, linking to prior knowledge of viruses. Explain that today they will learn how to scan and verify downloads, and success will be shown by correctly completing a scanning checklist.

Lesson Structure:
  1. Do‑now (5'): In pairs, discuss a recent news headline about malware from a download and list possible threats; teacher collects responses.
  2. Mini‑lecture (10'): Explain why scanning is required and review common threats using a slide deck.
  3. Demonstration (12'): Live walk‑through of the scanning process on a test file, showing each step from download to quarantine.
  4. Guided practice (15'): Students download a safe test file, save it to a temporary folder, run a scan, interpret results, and record actions on the checklist.
  5. Tool comparison activity (8'): Small groups compare features of Windows Defender, Malwarebytes, ClamAV, and discuss appropriate use cases.
  6. Best‑practice brainstorming (5'): Whole‑class list of safe‑downloading habits added to a mind map.
  7. Check for understanding (5'): Quick Kahoot quiz on when to scan, verify checksums, and update definitions.
Conclusion:

Recap the download‑scan‑verify process and why each step protects the system. Students complete an exit ticket stating one new habit they will adopt when downloading. For homework, assign them to research the checksum of a chosen software and report their findings.