This unit introduces students to the dangers of our interconnected world, and how cybersecurity is needed to keep our networks and online identities safe. It also includes techniques used by cybercriminals to steal data, disrupt systems, and infiltrate networks. The students will start by considering the value of their data to organisations and what they might use it for. They will then look at social engineering techniques used by cybercriminals to try to trick users into giving away their personal data.  Then they study the more common cybercrimes such as hacking, DDoS attacks, and malware, as well as looking at methods to protect themselves and our networks against these attacks.
There are very clear learning objectives and the new Learning Graphs to plan differentiated pathways for students through the unit.  

Lesson 6 includes a link to  There are more links for Cyber Security Careers on the National Stem Website at

The unit resources include a useful learning graph (.jpg file) to show how the unit content is sequenced - see this link  for an explanation.



Lesson 4 - Rise of the bots

The purpose of this lesson is to make students aware of malware and the different categories of malware, as well as understanding how they work and the potential damage they can do. This lesson focuses more on the technical side than on prevention methods, which will be covered in Lesson 5 of this unit. This lesson...

Lesson 5 - There’s no place like

The aim of this lesson is for students to develop their understanding of the risks that cyberthreats pose to a network, followed by an exploration of some of the more common methods of defending a network against attacks, such as firewalls and anti-malware. The students will look at the more common threats that...

Lesson 6 - Under attack

This is the final lesson in the unit, and the students are encouraged to reflect on the learning that has taken place throughout the unit before taking an end-of-unit assessment. The students will be prompted to reflect through a game called Under Attack. Students will work in groups to plan their defence strategy...


Published by


Share this resource