| Lesson Plan |
| Grade: |
Date: 01/12/2025 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand hacking including the measures that must be taken in order to protect data |
Learning Objective/s:
- Describe what hacking is and identify different types of hackers.
- Explain common hacking techniques and their potential impacts on organisations.
- Evaluate technical and organisational controls used to protect data from hacking.
- Apply a security‑checklist to a given scenario to recommend appropriate safeguards.
- Assess the legal and ethical considerations surrounding ethical hacking.
|
Materials Needed:
- Projector and screen for slides
- Whiteboard and markers
- Printed handouts of the hacking techniques checklist
- Laptop with internet access for a phishing‑email demo
- Sample firewall/antivirus configuration screenshots
- Quiz worksheets for formative assessment
|
Introduction:
Begin with a short video clip showing a recent high‑profile cyber‑attack to capture interest. Ask students what they already know about hacking and how it can affect individuals and businesses. Explain that by the end of the lesson they will be able to identify hacking methods and recommend practical safeguards to protect data.
|
Lesson Structure:
- Do‑now (5') – Students list any recent news stories about hacking they have heard.
- Mini‑lecture (15') – Define hacking, discuss types of hackers with examples.
- Interactive activity (10') – Group matching game: match hacking techniques to their impacts.
- Demonstration (10') – Show a simulated phishing email and discuss how to recognise it.
- Security controls workshop (15') – In pairs, analyse a case study and select appropriate technical and organisational controls from the checklist.
- Formative quiz & recap (5') – Quick Kahoot/worksheet to check understanding.
|
Conclusion:
Summarise the key points: hacking methods and the layered defence approach. Have students write one actionable security tip they will share at home as an exit ticket. Assign homework to research a recent cyber‑attack and prepare a brief report on the safeguards that could have prevented it.
|