Aim of the Module

To help students recognize manipulation tactics, pause before acting, and choose safer responses when someone uses pressure, urgency, or false trust.

Learning Objectives

  • Explain how manipulation can happen online and in person.
  • Identify common tactics like urgency, flattery, or authority.
  • Practice safe responses and help-seeking behavior.

Learning Outcomes

  • Recognize pressure tactics used in messages or chats.
  • Use a pause-and-check routine before acting.
  • Know when and how to report suspicious behavior.
Module Content
Part 1

What Is Social Engineering?

5 Steps 4 Materials 1 Video

Goal: Help students understand what social engineering is by first recognising how people can be influenced or manipulated in everyday situations, and then connecting this understanding to digital environments and attacker behaviour.

Download all the materials for this part of the module.

Download
What’s Included

Materials

  • Image: Tricking People vs Hacking Systems

    Download
  • Image: Examples of Social Engineering Messages

    Download
  • Situation Assessment: What Does an Attacker Want?

    Download
  • Worksheet: Understanding Social Engineering

    Download

Activity Plan

  • Step 1: Introduction – Influence and Persuasion in Everyday Life

    Download
  • Step 2: Introducing the Concept of Social Engineering

    Download
  • Step 3: What Do Attackers Want?

    Download
  • Step 4: Social Engineering Online and Offline

    Download
  • Step 5: Plenary – Informal Assessment

    Download
Featured Video

What Is Social Engineering?

Download Video Download Subtitles

Use this video to spark discussion about online spaces students already use, from learning platforms to games and messaging apps. Pause for quick reflections on where students spend time online.

Part 2

Why Is Social Engineering Used by Attackers?

5 Steps 4 Materials

Goal: Help students understand why attackers use social engineering by exploring the psychological and emotional levers that make people vulnerable, and practising how to think critically when they feel pressure.

Download all the materials for this part of the module.

Download
What’s Included

Materials

  • Image: Human Decision-making vs Computer Decision-making

    Download
  • Scenario Cards: Emotional Manipulation Examples

    Download
  • Game Cards: Attacker Tactics

    Download
  • Worksheet: Why Social Engineering Works

    Download

Activity Plan

  • Step 1: Introduction – People vs Systems

    Download
  • Step 2: Emotions Attackers Use

    Download
  • Step 3: Thinking Like an Attacker

    Download
  • Step 4: Everyday Contexts Where Social Engineering Works

    Download
  • Step 5: Plenary – Summary and Informal Assessment

    Download
Part 3

Recognising Social Engineering in Everyday Contexts

5 Steps 3 Materials 1 Video

Goal: Help students recognise social engineering attempts by identifying common warning signs and understanding the different contexts in which these attacks may occur, both online and offline.

Download all the materials for this part of the module.

Download
What’s Included

Materials

  • Image: Examples of Social Engineering Messages

    Download
  • Scenario Cards: Social Engineering Situations

    Download
  • Worksheet: Spot the Social Engineering

    Download

Activity Plan

  • Step 1: Introduction – Where Can Social Engineering Happen?

    Download
  • Step 2: Common Warning Signs

    Download
  • Step 3: Types of Social Engineering

    Download
  • Step 4: Practising Recognition

    Download
  • Step 5: Plenary – Informal Assessment

    Download
Featured Video

Types of Social Engineering

Download Video Download Subtitles

Use this video to spark discussion about online spaces students already use, from learning platforms to games and messaging apps. Pause for quick reflections on where students spend time online.

Part 4

Protecting Yourself and Others From Social Engineering

5 Steps 5 Materials

Goal: Help students practise verifying information and choosing safe responses, and empower them to support others when they encounter social engineering attempts.

Download all the materials for this part of the module.

Download
What’s Included

Materials

Activity Plan

  • Step 1: Introduction – From Recognising to Responding

    Download
  • Step 2: A Simple Model for Safe Decisions

    Download
  • Step 3: Practising Safe Responses

    Download
  • Step 4: Protecting Others

    Download
  • Step 5: Plenary – Informal Assessment

    Download
Related Modules

Related Modules

Continue building your students' cybersecurity knowledge with these connected topics.

Digital Citizenship

5 Parts 11 Materials 3 Videos 1 Challenge

This module helps kids develop responsible habits for communicating, sharing, and behaving respectfully in online spaces. It covers the core principles of ethical digital behaviour and sets a solid foundation for navigating the internet with confidence and care.

Start Exploring

Attacker Perspective

3 Parts 7 Materials 1 Video 1 Challenge

This module shows kids how online trust can be exploited and what risky behaviour looks like from the other side. Understanding how attacks happen is a key step in recognising and avoiding them in everyday digital life.

Start Exploring

Authentication

5 Parts 21 Materials 5 Videos 1 Challenge 1 Game

This module covers the essentials of protecting online accounts through strong, secure authentication habits. Kids learn practical routines around passwords and login safety that are easy to remember and genuinely effective.

Start Exploring

Data Privacy

4 Parts 9 Materials 2 Videos 1 Challenge 1 Game

This module explores what personal information actually is, how it gets shared — often without us realising — and what kids can do to stay in control of their digital footprint. It builds awareness of privacy as an active, everyday responsibility.

Start Exploring

Malware

4 Parts 13 Materials 2 Videos 1 Challenge 1 Game

This module helps kids recognise suspicious links, downloads, and software that can harm their devices. It builds practical awareness of how malware spreads and how simple, consistent habits can prevent it.

Start Exploring

Digital Abuse

6 Parts 5 Materials 4 Videos 1 Challenge 1 Game

This module addresses harmful online behaviour including cyberbullying, harassment, and coercion. Kids learn to identify when a situation has crossed a line and, importantly, how to seek help safely and confidently.

Start Exploring