
4.1 Protecting Devices
Topic Activity
Cyber Threat Detective
Aim of the activity
To help adult learners identify common cybersecurity threats and apply basic protection strategies (updates, antivirus, strong passwords, firewalls, and safe Wi-Fi use) in practical, everyday scenarios.
Target Group
Duration
45–60 minutes
(Adaptable for online, in-person, or hybrid delivery)
Objective
To help adult learners identify common cybersecurity threats and apply basic protection strategies (updates, antivirus, strong passwords, firewalls, and safe Wi-Fi use) in practical, everyday scenarios.
Materials necessary to execute activity
Online / Hybrid:
Zoom / Google Meet / MS Teams
Google Drive or Padlet for group notes
Stable internet and devices (PC/tablet/smartphone)
Shared digital collaboration tool (Miro, Jamboard, or Padlet)
In Person:
Laptops/tablets with internet access
Flipchart or whiteboard
Pens and sticky notes
Printed case scenarios of cyber threats
Steps for implementation
1. Icebreaker – “Have You Ever?” (10 min)
Facilitator asks quick yes/no questions (e.g., “Have you ever used public Wi-Fi at a café?”, “Have you ever clicked on a suspicious link?”)
Learners briefly share experiences and consequences.
This sets the stage by showing that cyber risks affect everyone.
2. Group Task – “Cyber Threat Detective” (20 min)
Divide learners into small groups (3-5 people).
Provide each group with a short case scenario (examples: phishing email, outdated software vulnerability, suspicious Wi-Fi network, weak password).
Task: Identify the threat, explain potential consequences, and propose protection strategies.
Each group writes down or illustrates their solutions and presents back to the class.
3. Mini-Demo & Discussion – “Best Practices in Action” (15 min)
- Facilitator demonstrates one or two protection strategies live:
How to check for software updates
How to enable a firewall
How to spot a phishing red flag in an email
- Learners discuss how easy or difficult they find these steps and share personal tips.
4. Reflection – “My Cyber Pledge” (10 min)
Each learner writes down or states:
One new thing they learned today.
One protection habit they will apply immediately in their daily life.
Adaptation Tips
Online: Use breakout rooms for group tasks; scenarios shared via Google Docs/Padlet; group presentations via screen share.
In person: Provide printed scenarios; groups work side by side; facilitator shows demos on projector.
Hybrid: Online participants join breakout rooms with in-person groups via devices; group presentations done using projector + shared screen.
Skills developed with the activity
By the end of the activity, learners will:
Recognize common cybersecurity threats (malware, phishing, unsafe Wi-Fi, weak passwords).
Apply key protection strategies to secure devices.
Collaborate in problem-solving real-life scenarios.
Commit to at least one personal cyber-safe behavior.
Methodology
- On-site
- Online
- Hybrid
Evaluation
Reflection – “My Cyber Pledge” (10 min)
Each learner writes down or states:
One new thing they learned today.
One protection habit they will apply immediately in their daily life.
Links & References
Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Education and Culture Executive Agency (EACEA). Neither the European Union nor EACEA can be held responsible for them.

