Two classroom activities for teaching students about password security

Creating and managing strong, secure passwords is an essential part of life in the 21st century. I’ve recently written about how you can use a password manager to help keep your own online accounts more secure. But how can we help our students to develop the skills to create and manage their own online accounts? After all, many of us have enough trouble doing it, and we’re all grown up! In this blog post, I’ll share two sequential classroom activities that you can use to teach your students about password security. Each activity is suitable for students of most ages, simply adjust the complexity of the task to suit your class.

[bctt tweet=”Want to help your students manage their passwords? Here are two classroom activities that can help.” username=”samvardanega”]

Activity 1: How secure is this password?


To learn which password combinations are the hardest to guess or crack.


Background information (for the teacher)

Secure passwords are difficult to guess by others or be cracked by computers designed for this purpose. Password ‘cracking’ involves a computer using a brute force attack to systematically try many password combinations until it finds the one that is your password. Simple and commonly used passwords are easily cracked.

So just how easy is it for a password to be cracked? In 2012 a password cracking machine was unveiled that could cycle through as many as 350 billion guesses per second. In eight hours, it was able to brute force every possible eight-character password combination containing upper- and lower-case letters, digits, and symbols.

The increasing amount of personal information we put on social media also makes it easier for other people to guess our passwords, including strangers who can access our social media profiles. Further, some ‘quizzes’ that distributed on social media are designed to steal passwords or password recovery answers (e.g. questions like ‘What was your first pet’s name?’ and ‘What town did you grow up in?’ are commonly used to help people recover forgotten passwords).


1. Introduce the aim of the activity. Advise students that they should not share their own passwords at any time during the activity!
2. Ask the class to suggest passwords that they think people might commonly use (both combinations – e.g. ‘password’ and categories – e.g. pet names).
3. Compare their list against the most commonly used passwords in 2017.
4. Explain to the students why it is important not to use a common password (including types) by drawing on the background information
5. Time to put the common passwords to the test and see how long it would take them to be cracked! Launch OR, enter each password and see the result.
6. Begin to use increasingly complex passwords (length and variation of characters) and see how the time frame changes. In doing this, help the students work out which numbers and symbols are easily exchangeable for letters. For example:

  •  chocolate
  • chocolatemilkshake
  • Ch0c0l@t3
  • Ch0c0l@t3M1lksh@k3!

7. Ask the students if, based on this activity, they think they should change some of their passwords? If yes, what strategies could they use make them stronger?

[bctt tweet=”In this classroom activity, students will see how easy it is to crack common passwords.” username=”samvardanega”]

Extension for older students

An extension activity for older students could be to analyse their own or a pre-prepared social media profile (or extract) and see what clues it gives away about the person’s possible passwords or password recovery answers. If you want to develop a fake profile for this purpose, you might like this ‘Fakebook’ Google Slides template.

Activity 2: Design the strongest passphrase

To learn how to design a strong password that is easy to remember.


Background information (for the teacher)
Designing and remembering a strong password can be difficult! However, an easier way to do it is to use a passphrase. Here are two options for developing a passphrase.

Option 1

Write a sentence that is easy to remember. This might be a line from a song or movie, a story about a place you have been, or any other phrase you can remember.

E.g. The cat is Milo and the dog is Otis

Take the first letter from each word to make your password (including capitalisation).
E.g. TciMatdiO

Change the letters to numbers and symbols where possible.
E.g. Tc1M&td10

Can also add a symbol on the end for extra length and complexity.
E.g. Tc1M&td10!

Option 2

Put three or four totally random words together.

Change the letters to numbers and symbols where appropriate.

1. Introduce the aim of the activity. Advise students that they should not share their own passwords at any time during the activity! They should also not use any of the passwords the class develops during the activity!
2. Explain to students the two ways to create a passphrase by working through examples.
3. Split the class into teams of two. Each team has a short amount of time to create a password based on a passphrase (adjust time to suit the age of your students).
4. Two teams at a time write their password on the board / into a shared document. Ask each team to explain how they came up with the password.
5. Time to vote! For each pair of passwords, have the class vote on which is stronger and discuss their reasoning.
6. Use or to check if the voting was right!
7. Ask the students to spend time at home sharing the passphrase method with their families and designing some passphrases they can use for their own passwords (and then changing them!).

[bctt tweet=”Here’s a fun activity that teaches students how to design a strong password by using a passphrase” username=”samvardanega”]

Password management is difficult for most of us! By using these two activities with your students, you will be helping them develop knowledge and skills they can use to protect their online accounts…plus you will pick up some useful tips for yourself too!

Want to access a community of educators to discuss these ideas more? Join our online professional learning community.

Related Post

How well do you use the
Apple Apps Google Workspace Microsoft 365
tools in your workplace?

Find out if you’re working with the tools OR if you’ve got the
tools working for you.

What Industry Are You In?

Using Apple Apps, Google Workspace or Microsoft 365?

What Type of user are you?

🫣 Entry User | 🤹 Skilled User | 👑 Elite User

Take the quiz to find out. 

Privacy Policy

Using Technology Better Privacy Commitment


We hold the privacy of your personal information in the highest regard.

Using Technology Better regards customer privacy as an important part of our relationship with our customers. The following privacy policy applies to all Using Technology Better users, and conforms to Internet privacy standards.

This policy will be continuously assessed against new technologies, business practices and our customers’ needs.

If you have questions or concerns regarding this statement, you should first contact the support team on our Contact Us Page.

Collection of Information

In order to use the Using Technology Better website, we may require information from you in order to provide the best service possible.

All correspondence may also be collected and stored, particularly in regard to sales, support and accounts, including Email.

Any information collected by Using Technology Better is collected via correspondence from you or your company. This may be via the telephone, Email, mail, fax or directly through our website.

Visitors and customers of will have their information shared back to DAIWABO INFORMATION SYSTEM CO., LTD. and DIS Service & Solution Co., Ltd.

Use of Collection Information

Any details collected from Using Technology Better customers is required in order to provide you with our

products and/or services, and a high level of customer service.

Correspondence is recorded in order to provide service references, and to assist in our staff development.

Web Site Use Information

Similar to other commercial Web sites, our Web sites utilize a standard technology called “cookies” (see explanation below, “What Are Cookies?”) and web server log files to collect information about how our Web site is used.

Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Web site, and the Web sites visited just before and just after our Web site.

Storage of Collected Information

The security of your personal information is important to us. When you enter sensitive information (such as credit card numbers) on our website, we encrypt that information using secure socket layer technology (SSL).

When Credit Card details are collected, we simply pass them on in order to be processed as required. We never permanently store complete Credit Card details.

We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it.

If you have any questions about security on our Website, you can email us at <ContactEmail>.

Access to Collected Information

If your personally identifiable information changes, or if you no longer desire our service, you may correct, update, delete or deactivate it by emailing us at <ContactEmail>.


If you purchase a product or service from us, we may request certain personally identifiable information from you.

You may be required to provide contact information such as:



Postal address

Your school or organisation

Financial information (such as credit card number, expiration date, name on card, card billing address).

We use this information for billing purposes and to fill your orders. If we have trouble processing an order, we will use this information to contact you.


Using Technology Better uses personally identifiable information for essential communications, such as


Accounts information

Critical service details.

We may also use this information for other purposes, including some promotional Emails.

If at any time a customer wishes not to receive such correspondence, they can request to be removed from any mailing lists by contacting support.

You will be notified when your personal information is collected by any third party that is not our agent/service provider, so you can make an informed choice as to whether or not to share your information with that party.

Third Parties

Using Technology Better may at its discretion use other third parties to provide essential services on our site or for our business processes.

We may share your details as necessary for the third party to provide that service.

These third parties are prohibited from using your personally identifiable information for any other purpose.

Using Technology Better does not share any information with third parties for any unknown or unrelated uses.

What Are Cookies?

A cookie is a very small text document, which often includes an anonymous unique identifier. When you visit a Web site, that site’s computer asks your computer for permission to store this file in a part of your hard drive specifically designated for cookies.

Each Web site can send its own cookie to your browser if your browser’s preferences allow it, but (to protect your privacy) your browser only permits a Web site to access the cookies it has already sent to you, not the cookies sent to you by other sites.

Browsers are usually set to accept cookies. However, if you would prefer not to receive cookies, you may alter the configuration of your browser to refuse cookies.

If you choose to have your browser refuse cookies, it is possible that some areas of our site will not function as effectively when viewed by the users.

A cookie cannot retrieve any other data from your hard drive or pass on computer viruses.

How Do We Use Information We Collect from Cookies?

As you visit and browse our Web site, the site uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security.

Cookies, in conjunction with our Web server’s log files, allow us to calculate the aggregate number of people visiting our Web site and which parts of the site are most popular. This helps us gather feedback to constantly improve our Web site and better serve our clients.

Cookies do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.


We reserve the right to disclose your personally identifiable information as required by law and when we believe that disclosure is necessary to protect our rights and/or comply with a judicial proceeding, court order, or legal process served on our Website.


Links on the Using Technology Better site to external entities are not covered within this policy. The terms and conditions set out in this privacy statement only cover the domain name of

Changes to Privacy Policy

If we decide to change our privacy policy, we will post those changes to this privacy statement, and other places we deem appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.

We reserve the right to modify this privacy statement at any time, so please review it periodically. If we make material changes to this policy, we will not use the personal information you have submitted to us under this Privacy Policy in a manner that is materially inconsistent with this Privacy Policy, without your prior consent

Delivery Policy

Most goods are digitally delivered instantly via email.  Our services may be delivered either via an online medium or live in person.

For our online delivery see below.  For services delivered live onsite, please refer to our speaker agreement form which is emailed to you on confirmation of booking.

Refund Policy

We do not offer refunds or returns unless we cannot supply goods or services or the goods or services are not delivered as promised.

Australian law is the governing body for all work, goods and services supplied by Using Technology Better.

Marketing Release

Using Technology Better (UTB) may film, record, and photograph me (the results of which are the “Recordings”). UTB may also incorporate into any production(s) any separate content (e.g., quotes, testimonials, biographical information, profiles, photos, videos, sound recordings, artwork, etc.) I provide to UTB or approve in writing (“Materials”).


I grant to UTB an irrevocable, perpetual, worldwide, royalty-free license to, in its sole discretion, (i) edit, translate, and modify the Recordings and the Materials, (ii) attribute the Recordings and Materials to me by my name, age, and city and state of residence, (iii) incorporate the Recordings and the Materials into content to promote UTB, its programs, or products (“Content”), and (iv) publicly use, distribute, reproduce, create derivative works from, and perform/display the Content, and any excerpts thereof, in any language.

2. No Compensation.

I grant this permission without any financial or other obligation of any nature.


For any issues or concerns please contact us