Skip to content
Computer Science Calendar view

Encryption, Ciphers and Digital Detectives


Course
Quantity
For someone else
Quantity
For someone else
For information on how to register in this course, click below.
Contact us

Learn about Encryption!

Pathway: Computer Science + AI Stage: Intermediate
Age:  8-11 Grade (US): 3-6
Pathway: Computer Science + AI
Age:  8-11
Stage: Intermediate
Grade (US): 3-6

In this course, you will explore the ways in which people have historically used encryption and ciphers to share and protect information and the modern world’s reliance on encryption. Looking at how encryption works through a mix of unplugged and plugged activities, you will both recognize how widespread its use is (for communication, commerce, and privacy) and come to understand how encryption systems work to protect and anonymize data. You will learn about some of the ingenious ways people have developed to protect and communicate information, explore the technology and concepts behind encryption, and apply those concepts in activities that focus on problem and puzzle-solving.

Learning Outcomes

1

Decrypt and encrypt basic ciphers

2

Use computational thinking strategies to solve problems

3

Apply understanding of codes and ciphers to the concept of digital encryption

4

Use strategies to design solutions to real-world problems

Method of Instruction

This course is intended for instructor delivery, either in-person or remotely. All instructional resources (lesson slide, handouts, quizzes, assessments, etc) can be downloaded for individual teacher customization and use. Should you have any questions regarding the curriculum, please do not hesitate to contact Digital Media Academy Support through the LMS.

 

Teacher Guide

The Teacher Guide contains all information required to deliver this Digital Media Academy Foundations course.

 

Curricular Connections Guide

Science, Language Arts, and Math curriculum integrations build student competency in core academic subjects while addressing essential, 21st-century technology skills. This Curricular Connections Guide is designed to spark your imagination of how to bring this course to life in your own classroom.

Standards Alignment

This course is aligned to national and international standards for technology education. Standards include: International Society for Technology in Education (ISTE), International Baccalaureate , UK National Curriculum, New Zealand Curriculum, and more!

Required Materials & Equipment

  • Access to computer or tablet with an internet connection

Career Pathways 

Digital Forensic Science (computers, images, video, sound), Computer Science (data, encryption), Programming, Scientist, Forensic Science, Medicine, Investigator, Archaeologist, Historian

Here is the course outline:

Getting Started

Read me first.

Getting Started

Teacher Resource

Covering course description, learning outcomes, teacher guide, required materials and equipment, career pathways, and standards alignment

Course Overview and Teacher Guide
Lesson Preparation Materials
Questions and Assignment - Course Overview
Modules 1 - 3 Video
Questions and Assignment - Modules 1 - 3
Quiz - Modules - 1 - 3
Modules 4- 5 Video
Questions and Assignment - Modules 4 - 5
Quiz - Modules - 4 - 5
Standards Alignment
Student Assessment Tools
Projects, Quizzes and Discussions by Module
Student Self-Assessment
Assessment Rubric
Curricular Integration and Assessment

Module 1: From Ancient Symbols to Computer Encryption

Why do we use symbols and code to communicate?

Lesson 1: Decoding Ancient Symbols
Lesson 2: Emoji Time: Communicating Feelings
Lesson 3: Symbols for a Purpose
Lesson 4: Code Your World

Module 2: Ciphers and Encryption: Caesar and Evil Bunnies

Learn about different ways you can hide information you want to keep secret.

Lesson 5: Code Cracking
Lesson 6: Sharing and Hiding Information

Module 3: Spies and Secret Codes

Learn how spying and solving crimes have changed with technology.

Lesson 7: Spies, Spying and Ciphers
Lesson 8: Dead Drops and Brush Passes
Lesson 9: Biometrics
Lesson 10: Digital Detectives

Module 4: Protecting Our Stuff

What tricks do companies use to protect us from hackers?

Lesson 11: Introduction to the Internet
Lesson 12: Encryption Keys and Passwords

Module 5: Cryptocurrency and Digital Security

Learn about digital money and take the digital security challenge!

Lesson 13: Introduction to Cryptocurrency
Lesson 14: Digital Security Challenge

Student Showcase

Now it's time to show off your projects!

How to Lead a Student Showcase
Student Showcase

Completion

The following certificates are awarded when the course is completed:

LSSW Course Completion Certificate