Lesson Plan

Lesson Plan
Grade: Date: 25/02/2026
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand characteristics and effects of spam email including the methods which can be used to help prevent spam
Learning Objective/s:
  • Describe the key characteristics of spam email.
  • Explain the personal, organisational and network effects of spam.
  • Identify technical controls such as filters, blacklists and authentication protocols.
  • Demonstrate safe user practices for handling suspicious email.
  • Evaluate how spam‑filter settings and DKIM/SPF/DMARC reduce spam risk.
Materials Needed:
  • Projector and screen
  • Computer with internet access
  • Printed examples of spam and legitimate emails
  • Worksheet with checklist and analysis questions
  • Whiteboard and markers
  • Email client (e.g., Outlook or Gmail) for live demo
Introduction:
Begin with a quick poll: “Who has received a suspicious email in the last week?” Discuss common signs they noticed. Link this to prior knowledge of basic email functions and outline today’s success criteria – students will be able to spot spam, explain its impacts, and apply prevention methods.
Lesson Structure:
  1. Do‑now (5'): Students list three signs of spam they have encountered; share with class (quick check).
  2. Mini‑lecture (10'): Present characteristics and effects of spam using slides; ask guided questions after each section.
  3. Group analysis (15'): In pairs, examine printed email samples, identify spam features, and record findings on the worksheet.
  4. Live demonstration (10'): Show how spam filters, blacklists, and DKIM/SPF/DMARC work in an email client; toggle settings.
  5. Role‑play activity (10'): Students practice marking an email as spam and reporting a phishing attempt to a mock IT desk.
  6. Summary & checklist (5'): Review key points, complete the checklist together, and collect exit tickets.
Conclusion:
Recap the main characteristics, impacts, and prevention strategies for spam email. Students complete an exit ticket describing one technical control and one user habit they will adopt. For homework, each learner drafts a personal “spam‑prevention plan” to share in the next lesson.