LESSON PLAN

VP-CTL-TP4         Teaching Practice 4

Lesson Plan

Name:

Ayman Zainol

ID:

202624027

Topic:

Computer and information security

( social engineering)

Date and Time:

2017

1. Curriculum Reference

2. Content Overview

 

  • The student learn what is social engineering
  • The student should to how to avoid social engineering hacker
  • The student know how to protect them self.

 

3. Learning Objectives

Long-term Objectives

Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information.

                                

Specific Objectives

The students …

  •    Famous people in social engineering
  •    Target of social engineering
  •    Types of social engineering
  •    Social Engineering by Phone

 (LO3)              Dumpster Diving

(LO4)               On-Line Social Engineering

(LO5)               Reverse Social Engineering

(LO6)               Dumpster diving

(LO7)               conclusion

(LO8)               survey and ask question  

 

 

 

 

 

 

 

 

 

 

4. Lesson Schedule

 

Phase

Learning objectives

Procedure

Teaching and learning steps

Methods and Media

Time

Introduction

(LO?)

Teacher action 

The teacher will introduce himself. And some rules of the lesson.

Students reaction

The students should listen to the teacher

PPT (1-2).

Classroom conversation.

5 min

Body

(LO1)

Teacher action 

The teacher will give the student overview about social engineering

Students reaction

The student should focus with the teacher.

PPT (3-4).

Lecher

5 min

Close

(LO2)

Teacher action 

Will explain what is the target and type pf social engineering

Students reaction

The student focus and discus with the teacher

PPT (5-6).

Lecher

5 min

(LO3)              

Teacher action 

Will explain how to use social engineering using phone

Students reaction

The student focus and discus with the teacher

PPT (7).

Classroom conversation.

5 min

(LO4)               

Teacher action 

Will explain what is Dumpster Diving mean

Students reaction

The student should listen and focus with the teacher

PPT (8).

Lecher

5 min

(LO5)               

Teacher action 

Will explain what On-Line Social Engineering mean

Students reaction

The student should listen and focus with the teacher

PPT (9).

Lecher

5 min

(LO6)               

Teacher action 

Will explain what Reverse Social Engineering mean

Students reaction

The student should listen and focus with the teacher

PPT (10).

Lecher

 

5 min

(LO7)               

Teacher action 

The teacher will review about the presentation

Students reaction

The student should listen and focus with the teacher

PPT (11)

Lecher

5 min

(LO8)               

Teacher action 

Will doing the survey and the student can ask question about the presentationplay video

 Students reaction

The student should doing the survey using smart phone and ask teacher question.

 

PPT (12-13-14)

Classroom conversation.

10 min

5. Learning Materials

...

6. References

... Orgill, G. L., Romney, G. W., Bailey, M. G., & Orgill, P. M. (2004, October). The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. In Proceedings of the 5th conference on Information technology education (pp. 177-181). ACM.‏

PPT
I BUILT MY SITE FOR FREE USING