Introduction to Encryption and Cryptography
CO220 Online course
Discover the history of encryption and learn how it's used in the modern world
Skip to course bookingDiscover the history of encryption and learn how it's used in the modern world. On this course, you will learn about what encryption is and understand its use in the past by using the Caesar and Vigenère ciphers. You will also look at the present and future of encryption and investigate both symmetric and asymmetric encryption schemes. The course includes several practical encryption activities which you can complete and use in your own classroom. There are several optional steps involving using Python to implement some forms of encryption. We recommend that for these you are comfortable using functions with parameters.
You can benefit from facilitation by expert Professional Development Leaders during specific dates for each section of the course:
- 16th Sept – 22nd Sept: week 1
- 23rd Sept – 30th Sept: week 2
- 11th Nov - 17th Nov: week 1
- 18th Nov - 24th Nov: week 2
Don’t worry if you’ve missed the facilitation windows, you can still benefit from the contributions of others.
Who is it for?
This course is for prospective teachers of Key Stage 3 computing and GCSE computer science, who may be new to the subject.
No prior experience or knowledge of computer science is expected before attending this course.
Topics covered
- Encryption and decryption
- Using ciphers to teach encryption
- Symmetric and asymmetric encryption
- How encrpytion is used in the modern world
How long is this course?
This is approximately 8 hours of self-directed learning.
How will you learn?
This online, self-paced course can be completed flexibly. You can join and start this course at any time after the advertised date, and keep access for a year after booking. You can learn independently or with colleagues to directly address your individual needs.
This course will be periodically facilitated by expert Professional Development Leaders.
Outcomes
By the end of the course, you‘ll be able to...
- Describe the general process of encryption and decryption
- Apply a Caesar Cipher and a Vigenère Cipher
- Discuss the advantages and disadvantages of different encryption algorithms
- Compare symmetric and asymmetric encryption
- Demonstrate methods of breaking simple encryption schemes
- Describe how encryption is used in the modern world, and some of the possible ethical implications of this
This course is part of the KS3 and GCSE Computer Science subject knowledge certificate
Key stage 3 and GCSE Computer Science certificate
Our certificate is designed to help you develop or refresh your computer science subject knowledge.
Join this course
You need to be logged in to join the course.
Adapted teaching and effective learning interventions in secondary computing
Develop an evidence-informed approach to education recovery over a sustained period, securing the computing education of young people following a period of great disruption.
Adapting the Teach Computing Curriculum for mixed-year classes - short course
Explore progression within Teach Computing Curriculum and how to use this to adapt it for your own mixed-age setting.
AI and Ethics in GCSE computer science
Artificial intelligence, what is it? How does it work? What are the ethical considerations for GCSE students. How could you teach it to your students?