top of page
image.jpeg
image.png
image.png
image.png
image.jpeg

4.1 Protecting Devices

Topic Activity

Cyber Threat Detective

Aim of the activity

To help adult learners identify common cybersecurity threats and apply basic protection strategies (updates, antivirus, strong passwords, firewalls, and safe Wi-Fi use) in practical, everyday scenarios.

Target Group

Duration

45–60 minutes
(Adaptable for online, in-person, or hybrid delivery)

Objective

To help adult learners identify common cybersecurity threats and apply basic protection strategies (updates, antivirus, strong passwords, firewalls, and safe Wi-Fi use) in practical, everyday scenarios.

Materials necessary to execute activity

Online / Hybrid:

  • Zoom / Google Meet / MS Teams

  • Google Drive or Padlet for group notes

  • Stable internet and devices (PC/tablet/smartphone)

  • Shared digital collaboration tool (Miro, Jamboard, or Padlet)

In Person:

  • Laptops/tablets with internet access

  • Flipchart or whiteboard

  • Pens and sticky notes

  • Printed case scenarios of cyber threats

Steps for implementation

1. Icebreaker – “Have You Ever?” (10 min)
  • Facilitator asks quick yes/no questions (e.g., “Have you ever used public Wi-Fi at a café?”, “Have you ever clicked on a suspicious link?”)

  • Learners briefly share experiences and consequences.

  • This sets the stage by showing that cyber risks affect everyone.


2. Group Task – “Cyber Threat Detective” (20 min)
  • Divide learners into small groups (3-5 people).

  • Provide each group with a short case scenario (examples: phishing email, outdated software vulnerability, suspicious Wi-Fi network, weak password).

  • Task: Identify the threat, explain potential consequences, and propose protection strategies.

  • Each group writes down or illustrates their solutions and presents back to the class.

 

3. Mini-Demo & Discussion – “Best Practices in Action” (15 min)

- Facilitator demonstrates one or two protection strategies live:

  • How to check for software updates

  • How to enable a firewall

  • How to spot a phishing red flag in an email

- Learners discuss how easy or difficult they find these steps and share personal tips.

 

4. Reflection – “My Cyber Pledge” (10 min)

Each learner writes down or states:

  • One new thing they learned today.

  • One protection habit they will apply immediately in their daily life.


Adaptation Tips
  • Online: Use breakout rooms for group tasks; scenarios shared via Google Docs/Padlet; group presentations via screen share.

  • In person: Provide printed scenarios; groups work side by side; facilitator shows demos on projector.

  • Hybrid: Online participants join breakout rooms with in-person groups via devices; group presentations done using projector + shared screen.

Skills developed with the activity

By the end of the activity, learners will:

  • Recognize common cybersecurity threats (malware, phishing, unsafe Wi-Fi, weak passwords).

  • Apply key protection strategies to secure devices.

  • Collaborate in problem-solving real-life scenarios.

  • Commit to at least one personal cyber-safe behavior.

Methodology

-       On-site

-        Online

-        Hybrid

Evaluation

Reflection – “My Cyber Pledge” (10 min)

Each learner writes down or states:

  • One new thing they learned today.

  • One protection habit they will apply immediately in their daily life.

Links & References

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Education and Culture Executive Agency (EACEA). Neither the European Union nor EACEA can be held responsible for them.

EU co-funded logo.jpg
  • LinkedIn
  • Facebook
  • YouTube
  • Instagram

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Education and Culture Executive Agency (EACEA). Neither the European Union nor EACEA can be held responsible for them.

bottom of page