+
Lesson Plan
Curated OER

Transposition Cryptography

For Teachers 8th - 10th
Students differentiate the types of cryptosystems and use them to communicate privately. In this algebra instructional activity, students use substitution and transposition to identify the cryptographs. They send and receive cryptograms...
+
Assessment
Code.org

Practice Performance Task - Security and Hacking in the Real World

For Teachers 9th - 12th
Young computer scientists create a visual artifact that represents their research into a computing innovation in the world of cybersecurity. They then work individually to write an essay on the impact of technology on cybersecurity.
+
Activity
Computer Science Unplugged

Kid Krypto–Public-Key Encryption

For Teachers 6th - 12th
Class members have an opportunity to experience how to use a public key to encrypt information and a private key to decrypt it. Groups create their own public key and encrypt information then develop private keys to decrypt this...
+
Assessment
Bowland

German or English?

For Teachers 6th - 8th
Sprechen sie Deutsch? Future cryptographers must decide whether an unknown text is written in English or in German. They use provided pie charts about the frequency of words in the English and German languages to help make their decisions.
+
Interactive
PBS

NOVA Cybersecurity Lab Game

For Students 6th - 12th
It's important to protect yourself online. An online game has pupils imagine themselves as cybersecurity specialists at a social networking company. They learn about ways to protect data online through a series of challenges.
+
Lesson Plan
PBS

NOVA Cybersecurity Lab Lesson Plan

For Teachers 6th - 12th
Don't be fooled by cyber scams! An informative lesson teaches techies about cybersecurity. They watch videos, play a game, and engage in discussion to improve their understanding of online safety.
+
Activity
Computer Science Unplugged

The Peruvian Coin Flip–Cryptographic Protocols

For Teachers 4th - 12th
A digital flip. Introduce your classes to cryptographic protocols using and, or, and not gates. Groups create a complete circuit to convert a binary number into another one. This type of one-way function allows pupils to verify the...
+
Lesson Plan
Curated OER

Grilling Algebra

For Teachers 7th - 11th
Students use a grille to investigate geometry. The application of the geometric figure, which is square, the students begin the coding of a message. The use of cryptography is used to reinforce algebraic ideas.
+
Lesson Plan
Code.org

Keys and Passwords

For Teachers 9th - 12th
Scholars explore the relationship between cipher keys and passwords and as they learn more about the Vigenere cipher and continue to read from the book Blown to Bits in the seventh lesson plan of the series. They conduct an activity...
+
Lesson Plan
Code.org

The Need for Encryption

For Students 9th - 12th
Scholars investigate the need for encryption as they read a portion of the book Blown to Bits and discuss encryption techniques. They finish by attempting to decode a message written using a Caesar cipher.
+
Lesson Plan
Curated OER

Coding History

For Teachers 10th - Higher Ed
Young scholars study the topic of codes in Computer Science. They research it history, divisions in the field and its applications. The lesson plan also includes a brief overview of the information technology theory.
+
Lesson Plan
Curated OER

Sieve of Eratosthenes

For Teachers 5th - 8th
Students discover the Sieve of Erathosthenes. They explore a method to find all the prime numbers in a group of numbers. Using models, students practice divisibility rules while examining the difference between prime and composite numbers.
+
Lesson Plan
Curated OER

Informational Writing: Business Letter

For Teachers 5th
Fifth graders write business letters. In this business letter instructional activity, 5th graders discuss the format and reasons for writing a business letter. They pick who they want to write to and create their own letter. 

Other popular searches