Learn about Encryption!
In this course, you will explore the ways in which people have historically used encryption and ciphers to share and protect information and the modern world’s reliance on encryption. Looking at how encryption works through a mix of unplugged and plugged activities, you will both recognize how widespread its use is (for communication, commerce, and privacy) and come to understand how encryption systems work to protect and anonymize data. You will learn about some of the ingenious ways people have developed to protect and communicate information, explore the technology and concepts behind encryption, and apply those concepts in activities that focus on problem and puzzle-solving.
Learning Outcomes
Method of Instruction
This course is intended for instructor delivery, either in-person or remotely. All instructional resources (lesson slide, handouts, quizzes, assessments, etc) can be downloaded for individual teacher customization and use. Should you have any questions regarding the curriculum, please do not hesitate to contact Digital Media Academy Support through the LMS.
Teacher Guide
The Teacher Guide contains all information required to deliver this Digital Media Academy Foundations course.
Curricular Connections Guide
Science, Language Arts, and Math curriculum integrations build student competency in core academic subjects while addressing essential, 21st-century technology skills. This Curricular Connections Guide is designed to spark your imagination of how to bring this course to life in your own classroom.
Standards Alignment
This course is aligned to national and international standards for technology education. Standards include: International Society for Technology in Education (ISTE), International Baccalaureate , UK National Curriculum, New Zealand Curriculum, and more!
Required Materials & Equipment
- Access to computer or tablet with an internet connection
Career Pathways
Digital Forensic Science (computers, images, video, sound), Computer Science (data, encryption), Programming, Scientist, Forensic Science, Medicine, Investigator, Archaeologist, Historian
Here is the course outline:
Getting StartedRead me first. 1 section
|
|
|
Teacher ResourceCovering course description, learning outcomes, teacher guide, required materials and equipment, career pathways, and standards alignment 15 sections
|
|||||||||||||||
|
Module 1: From Ancient Symbols to Computer EncryptionWhy do we use symbols and code to communicate? 4 sections
|
||||
|
Module 2: Ciphers and Encryption: Caesar and Evil BunniesLearn about different ways you can hide information you want to keep secret. 2 sections
|
||
|
Module 3: Spies and Secret CodesLearn how spying and solving crimes have changed with technology. 4 sections
|
||||
|
Module 4: Protecting Our StuffWhat tricks do companies use to protect us from hackers? 2 sections
|
||
|
Module 5: Cryptocurrency and Digital SecurityLearn about digital money and take the digital security challenge! 2 sections
|
||
|
Student ShowcaseNow it's time to show off your projects! 2 sections
|
||
|
Completion
The following certificates are awarded when the course is completed:
LSSW Course Completion Certificate |