| Full lesson | Create for a teacher a set of content for giving a lesson, beginning with the lesson plan. Each new block of materials must begin with an H1 heading (other subheaders must be H2, H3, etc). When you describe required pictures, write those descriptions in curly brackets, for example: {A picture of a triangle} |
| Which subject | Design and technology |
| What topic | Ethical Hacking |
| What length (min) | 30 |
| What age group | Year or Grade 11 |
| Class size | 20 |
| What curriculum | |
| Include full script | |
| Check previous homework | |
| Ask some students to presents their homework | |
| Add a physical break | |
| Add group activities | |
| Include homework | |
| Show correct answers | |
| Prepare slide templates | |
| Number of slides | 5 |
| Create fill-in cards for students | |
| Create creative backup tasks for unexpected moments |
Ethical Hacking
Year 11
Design and Technology
20 students
30 minutes
This lesson aligns with the national curriculum objectives for cybersecurity awareness and the importance of ethical behavior in technology-related fields.
| Step Number | Step Title | Length | Details |
|---|---|---|---|
| 1 | Introduction | 5 minutes | Briefly introduce the topic of ethical hacking and its relevance. Explain what will be covered in the lesson. |
| 2 | Discussion of Terms | 5 minutes | Define key terms: ethical hacking, malicious hacking, cybersecurity. Encourage students to share thoughts. |
| 3 | Differences in Hacking | 5 minutes | Discuss and create a table on the board comparing ethical hacking vs. malicious hacking. |
| 4 | Tools and Techniques | 10 minutes | Introduce common ethical hacking tools (e.g., Wireshark, Metasploit) and show demo videos. Discuss their uses and importance. |
| 5 | Legal Implications | 3 minutes | Discuss the legal aspects of hacking, including laws and ethical considerations. |
| 6 | Summary and Q&A | 2 minutes | Summarize key points from the lesson. Open the floor for any final questions from students. |
Students are to research an ethical hacking tool of their choice and write a one-page report detailing its purpose, usage, and ethical implications. Reports will be collected and checked without presentations.