Lesson Plan
Lesson Plan
Students will learn to identify common phishing warning signs and practice spotting phishing attempts through real-world scenarios to build safe online habits.
This lesson builds critical digital literacy and cybersecurity awareness, empowering students to protect personal data and make safer online choices.
Audience
7th Grade
Time
20 minutes
Approach
Interactive discussion and hands-on worksheet practice
Materials
- Spot the Phish Worksheet, - Projector or Smartboard, - Printed example phishing scenarios, and - Timer or stopwatch
Prep
Teacher Preparation
10 minutes
- Print enough copies of Spot the Phish Worksheet for each student
- Review example phishing emails and scenarios you plan to share
- Prepare projector slides or digital examples (optional)
Step 1
Warm-Up
3 minutes
- Ask: “Have you ever received an odd email or message? What made it seem suspicious?”
- Jot student responses on the board to surface prior experience
- Transition: today we’ll learn key clues to spot phishing
Step 2
Introduction to Phishing
4 minutes
- Define phishing: fraudulent messages designed to steal info
- Show one real-world phishing example via projector or printout
- Highlight warning signs: unknown sender, spelling errors, urgent requests
Step 3
Main Activity: Spot the Phish
8 minutes
- Distribute Spot the Phish Worksheet
- Students work individually to label each scenario as “Legitimate” or “Phishing” and note the clues
- Circulate and prompt critical thinking: “What made you choose that?”
Step 4
Discussion & Safe Practices
3 minutes
- Review worksheet answers as a class, discussing each scenario
- Emphasize verification strategies: hover over links, check sender address, ask an adult
- Brainstorm safe behaviors: strong passwords, two-factor authentication
Step 5
Closure & Assessment
2 minutes
- Exit ticket: write one phishing warning sign and one safe online practice
- Collect responses or have volunteers share aloud
- Reinforce that spotting phishing keeps personal data secure
use Lenny to create lessons.
No credit card needed
Slide Deck
Are You a Cyber Sleuth?
Strengthening digital literacy & cybersecurity awareness
Learn to spot phishing attempts and protect your personal data.
Welcome students! Introduce today’s topic: spotting phishing emails and staying safe online. Explain that by the end of this lesson, they’ll be able to identify common warning signs and practice safe behaviors.
Warm-Up: Odd Emails?
Have you ever received an odd email or message?
• What made it seem suspicious?
Share your stories!
Kick off engagement: ask students to think of any suspicious email or message they've received. Encourage a few volunteers to share their experiences.
What Is Phishing?
Phishing is a fraudulent message (email, text, or website) designed to steal your information.
Key goal: trick you into revealing passwords, credit cards, or personal data.
Define phishing clearly. Emphasize that phishing is a type of online scam designed to trick people into revealing private information.
Warning Signs of Phishing
• Unknown or mismatched sender address
• Spelling and grammar errors
• Urgent requests (“Your account will close!”)
• Suspicious links or attachments
• Requests for personal or financial info
Highlight the top warning signs of phishing. Give real-life context: show how scammers use urgency and fake branding.
Spot the Phish: Example
“Dear User,
Your bank account has been suspended. Click here to verify: http://fake-bank-login.com”
What clues tell you this is phishing?
Display or hand out the example email. Ask students to identify as many red flags as they can. Then transition to the full worksheet.
Main Activity Instructions
• Label each scenario as “Legitimate” or “Phishing”
• Note the clues you used to decide
• Work individually (8 minutes)
• I will circulate to help and ask questions
Distribute the Spot the Phish Worksheet. Explain expectations and timing.
Closure & Reflection
Exit Ticket:
- Write one phishing warning sign you learned.
- Write one safe online practice you’ll use.
Turn in your ticket before you go!
Gather students back together. Ask a few to share one scenario and the clues they spotted. Then explain the exit ticket.
Worksheet
Spot the Phish Worksheet
Instructions
Read each scenario below. For each:
- Label it Legitimate or Phishing.
- Identify at least two warning signs or clues that helped you decide.
Scenario 1
Email from security@online-bank.com
Subject: Your Account Has Been Compromised!
Body: “Dear Customer, we detected suspicious activity on your account. Please verify your information immediately by clicking the link below:
http://online-bank.verify-account.info”
- Label: _______________________________
- Clues (list at least two):
Scenario 2
Text message from your friend Jamie
“Hey! Are you coming to soccer practice at 4:00 PM? Let me know!”
- Label: _______________________________
- Clues (list at least two):
Scenario 3
Direct message on social media from Admin
“Congratulations! You’ve won a free gift card. Claim it now at bit.ly/free-gift”
- Label: _______________________________
- Clues (list at least two):
Scenario 4
Email from your science teacher
Subject: Science Project Reminder
Body: “Don’t forget: your science fair project is due next Monday. See the attached rubric for requirements.”
- Label: _______________________________
- Clues (list at least two):
Answer Key
Answer Key for Spot the Phish Worksheet
Use this answer key to check correctness and understand the reasoning behind each label. Encourage students to look for the same warning signs and thought process.
Scenario 1
Email from security@online-bank.com
Subject: Your Account Has Been Compromised!
Body: “Dear Customer, we detected suspicious activity on your account. Please verify your information immediately by clicking the link below:
http://online-bank.verify-account.info”
Correct Label: Phishing
Reasoning & Clues
- Sender address mismatch
• Real banks use their official domain (e.g., bank.com), not “online-bank.com” or “verify-account.info.” - Suspicious URL structure
• The link uses a different domain (verify-account.info) rather than the bank’s secure site. - Urgent, fear-inducing language
• “Account has been compromised” and “verify immediately” pressure you to click without thinking. - Generic greeting
• “Dear Customer” instead of your actual name is a common phishing tactic.
Thought Process:
Bank emails should come from a familiar domain, use your name, and direct you to a secure, recognizable URL (often with “https” and a lock icon). Anything that seems mismatched or overly urgent is a red flag.
Scenario 2
Text message from your friend Jamie
“Hey! Are you coming to soccer practice at 4:00 PM? Let me know!”
Correct Label: Legitimate
Reasoning & Clues
- Recognizable sender
• It’s from your friend Jamie—a known contact. - Contextual message
• The content matches your usual conversations (soccer practice). - No links, attachments, or urgent requests for personal info
• Just a simple question about plans.
Thought Process:
Safe messages often come from people you know, use normal language, and don’t ask for passwords or offer deals. If it feels familiar and harmless, it’s likely legitimate.
Scenario 3
Direct message on social media from Admin
“Congratulations! You’ve won a free gift card. Claim it now at bit.ly/free-gift”
Correct Label: Phishing
Reasoning & Clues
- Unknown or generic sender
• “Admin” isn’t a real person or account you follow. - Too good to be true
• Free gift cards are a common lure. - URL shortener
• bit.ly links hide the true destination and can lead to malicious sites. - No personalization or context
• You didn’t enter a contest, so the offer is suspicious.
Thought Process:
Be wary of unexpected prizes or offers—especially when the sender is vague and uses hidden links. Always verify by visiting official pages, not via shortened URLs.
Scenario 4
Email from your science teacher
Subject: Science Project Reminder
Body: “Don’t forget: your science fair project is due next Monday. See the attached rubric for requirements.”
Correct Label: Legitimate
Reasoning & Clues
- Recognizable sender and subject
• Comes from your known teacher with a clear, relevant subject. - Appropriate content and tone
• Reminder about a class assignment—no urgency beyond a normal deadline. - No suspicious links or requests for private info
• Just an attachment for class work.
Thought Process:
Legitimate school emails: come from a teacher’s official address, contain relevant class information, and don’t ask for extra personal details.
Key Warning Signs to Remember
- Mismatched or unfamiliar sender addresses
- Spelling/grammar errors and generic greetings
- Urgent language or fear tactics
- Suspicious or hidden links (look for “https” and hover before clicking)
- Unexpected requests for personal/financial info
Use these clues every time you evaluate a message. Spotting phishing keeps your data—and you—safe online!
Warm Up
Warm-Up Prompt: Odd Emails?
Have you ever received an odd email or message? Think about one that made you pause and wonder if it was safe.
- Describe the message you received (Who was it from? What did it say?).
- Identify the clue or detail that seemed suspicious.
- Explain how you reacted or what you did next.
Write your response below:
Cool Down
Exit Ticket
- Write one phishing warning sign you learned:
- Write one safe online practice you’ll use:
Turn in your ticket before you go!