Aim of the Module

To provide an overview of the attacker perspective by helping learners recognize attacker techniques and understand the motives behind cyber-attacks.

Learning Objectives

  • To develop students understanding of attacker motivations, including psychological, social, and economic factors.
  • To build students skills in recognizing common attacker techniques.

Learning Outcomes

  • I understand the attacker motives and can give examples related to psychological, social and economic factors.
  • I can recognize attacker techniques in given scenarios.
Module Content
Part 1

Let us Define The Circle of Trustees

2 Steps 2 Materials

Goal: Help children gain knowledge of the concept of a trusted person and develop skills in identifying the circle of trusted persons.

Download all the materials for this part of the module.

Download
What’s Included

Materials

  • Worksheet: Trusteees: People Around Me

    Download
  • Worksheet: Circles of Trust

    Download

Activity Plan

  • Step 1: Introduction

    Download
  • Step 2: Define the Circle of Trustees

    Download
  • Step 3: Plenary – Summary and Informal Assessment

    Download
Part 2

What Is an Adversary?

4 Steps 3 Materials 1 Video

Goal: Introduce the concept of an attacker and motivation from the attacker perspective.

Download all the materials for this part of the module.

Download
What’s Included

Materials

Activity Plan

  • Step 1: Introduction

    Download
  • Step 2: Define a Cybersecurity Attacker

    Download
  • Step 3: Understand the Attacker's Motivation

    Download
  • Step 4: Plenary – Summary and Informal Assessment

    Download
Featured Video

Who is Behind Cyber Attacks?

Download Video Download Subtitles

Use this video to spark discussion about online spaces students already use, from learning platforms to games and messaging apps. Pause for quick reflections on where students spend time online.

Part 3

What Are the Attacker Techniques?

4 Steps 2 Materials

Goal: Introduce the basic techniques (tactics) relevant to children that attackers use to achieve their goals.

Download all the materials for this part of the module.

Download
What’s Included

Materials

  • Image: Common Adversary Techniques

    Download
  • Situation: Smishing and Impersonation

    Download

Activity Plan

  • Step 1: Introduction

    Download
  • Step 2: Understand Behavioural Patterns

    Download
  • Step 3: Understand Attack Paths

    Download
  • Step 4: Plenary – Summary and Informal Assessment

    Download
Explore Other Topics

Other Modules

Browse related modules and continue learning.

Digital Citizenship

5 Parts 11 Materials 3 Videos 1 Challenge

This module helps kids develop responsible habits for communicating, sharing, and behaving respectfully in online spaces. It covers the core principles of ethical digital behaviour and sets a solid foundation for navigating the internet with confidence and care.

Start Exploring

Authentication

5 Parts 21 Materials 5 Videos 1 Challenge 1 Game

This module covers the essentials of protecting online accounts through strong, secure authentication habits. Kids learn practical routines around passwords and login safety that are easy to remember and genuinely effective.

Start Exploring

Data Privacy

4 Parts 9 Materials 2 Videos 1 Challenge 1 Game

This module explores what personal information actually is, how it gets shared — often without us realising — and what kids can do to stay in control of their digital footprint. It builds awareness of privacy as an active, everyday responsibility.

Start Exploring

Social Engineering

4 Parts 16 Materials 2 Videos 1 Challenge 1 Game

This module dives into the human side of cybercrime — how scammers use persuasion, false urgency, and deception to manipulate people into giving up information or access. Kids learn to pause, question, and verify before they act.

Start Exploring

Malware

4 Parts 13 Materials 2 Videos 1 Challenge 1 Game

This module helps kids recognise suspicious links, downloads, and software that can harm their devices. It builds practical awareness of how malware spreads and how simple, consistent habits can prevent it.

Start Exploring

Digital Abuse

6 Parts 5 Materials 4 Videos 1 Challenge 1 Game

This module addresses harmful online behaviour including cyberbullying, harassment, and coercion. Kids learn to identify when a situation has crossed a line and, importantly, how to seek help safely and confidently.

Start Exploring