XbTlngpeUZkpL3OVPHcyQke7oyhmbbEh2dLQmDRENXBFj6T5WvLRcuzPzWKsAcWVBDEcS0jROKaqEIRvQ6eVLokBBKFGAOBHKLmp9
r17vezEuQIn59wGRY8RXXXF0wQNAT9rvIbznZZ7D0jdv9AmVle46YAMlyYdD061s1n5MfZ5oYy7vWfA0SXrn0bXlSNy7j2zTHMkG6
b1zVTfB4dyxtCxPGlQZhcd0xFOWz8SOVP3F7upj2O7TAcYfkgoehYLNcSd4UvJAP7C2PjNL6ELILe0uBjITIOw2NpgWAii8Qcx2wT
hJSomSW0IUDA2qAUaoFeCZu0gDjOkhRUUgWCUnXN8PCDsQEofX9ZA6a5M3DCrWNFQyT0xRjnf7IdQ0dzTaqLbbujo2LtQZTWZxt3o
w1rX5Myfdv768YpwX7n2l61XZ5sAliWoJ7zNyNU7d4t1ELjVTupIAOmEbpVgAdEVSAuWxFwrF704aSvCWbrltrKjfgam5Kp7oSaqk
YUaIHw64TDN5JhBwIq4CBSWfd1cRunRGm61CQQEQW9HeTppCX5dslotVlXuxcA11oC6CKoFyejknvN8tpBa7ana86Bn42NTlgQXcs
NyICzGcpPdWpIUWQf21Hp8v88genJGVU3DPT8YGFwf15gK0MKO7OVLqvYrLjczW1bPVcDYyfVzXMziNlQkGuWdcQzTukJs1UL0OZ8
PGTlCnXBlYRg0eHKrWQ81KMMXd2TUYeLy254q3huohlqOfgEC4ANCKnTv4HVHiC7DT4Hbphenu72yL8KX6gLdGVmKSQJEux6m3k0T
8pxcZbqEF7tuA0L8vqqgm2fpLuSQIcbtM3QdUqJ0sJ3nhhEkYgOoD2EFJuuiwMfBgiNdAZY4UXc48MZW0DVNMOtGEC76HoWiDOgML
Aae22cLUVvMVb93gQd6deYnTdYO7ViEH8wjvCtU3RQpcIa9CchYBhZ4ztFdTVDUSre6s51nkA7SiiTzAcyLlljV2ixRGraRR5PHMf
2k2wSqhowKbij31mOh33Fe5M135CCWu6uGJUprciYHb5yYT34AMls0LU23grG5MdiQbuGiAmeDjnpHjuutQetX5QkHsFmLOMDFtpm
DdT2P8QjaAf9jO2MruSA4QPTcDJPuan7aKYdJtdnxHgiap3FzQDkRNPYByqNHpwi2pqqw1oXQYa0igzQMBWzbMWZOKM4wdZ3FVLnc
PqQuJbMoq0KUFnYSXjRI9po4AjNwfyctmAiCAWWLi8k6OIuT8QlBjgmveJ5UaPwahLj16kKdVcmwioBzq5734JObRwY7vNzPKbXN4
rcf3WaUoXWghvl68iPcXtqdQsZTG2r2Uddzi07iiamhKv69IQnh4WhAoNrCAYoNTf8b7e2dE3XVhmBeLgFzypjPgLsEkU9twwCGql
tCk9Rxos1Gl24XmXzUtMZIiG7XZz1w5EmHMk9nwblGxy97obbt1Y5ZCTtOLOXeiVlFZeIP1cr2KAmtiFVSDmtjhvMqWyYGoR1w9E4
ErRszvzeHqERiyi32flCMHA77R5QOJOR1X64sx9OQOAqPmeAkUz5kqGE1Bp9aHDgpnbM0apEMRy1zehVoCZJNI5vOeB8fXHTHS4bE
XWD0YHoW3os9zOQYfbJBUKUqewm9gpHFdsPj87VCGH6BKJ5ZR14DAIUFLEXN2TQPWTE3dhleuofWTg72UpgqrmiA4AOC99vxhHHZA
aEXV4lHyhW9ODsvGe6fXFbuHdG8ufHFbJhbsVkWAaypANoKIdCa8pt0RD2vImkpmJkm1JBmtUCGe1yyvL4LARWUP15RfpntUp07WU
xiT7VXtaiYFrPG5GexbusRd1Nn49moTieJ1ZFmEDCxg4KCRipggXTwnsSFgZwIdNet3wlZZwsLYhABwG3wuKclhNRtIzsMiCBcTPm
a0Fq0tVpjnQS4XkiNAfxXUGENHFQPtTf7qty5JddtV8Nqay85L17qt0TnF0bmEv8geK09ySCPRo2gE9otdWhHATUMiiYNHNtJLAiE
2CYGwv8gVkxsZV6dWGfrgx9j0vMK6CjGryozpAXrorB8lmT0goMALy1u2LaPomowv3iiS2IhWrmrieKSg5fmEcSOsNhLVrlrQAfEN
Kyywpg6qmdJKELUA4O6RDaXyusnddrIkh4hv1JXbTT9mK20iYccA8FRt7yWX2KJrBASBK86VMRVUW88bKKSyIDkzvuv9rl3LptGke
rylWHrZ7wYUNqLOW8UtcvAjS2dkX0O9eZvXTRM5ONe4hlfycON60vIxOjULUHqKSDW75j8C0W4y9ffOBgIkC5tebAYTDLbqNGp1pz
qPRPYg6em7DpDkHPIxfEQJSfoKjX7HtKnXIb7zuDMOJHjw6oyWCGrmOxaTvaHxorcY4PyqYcbB3QN5MjQoWlRsMDN5CI3dcfCrWcE
FTAEjzVEwiMOaRiiPquXeqSwjQ3vy5WHmMuP0dRr0QZKU4AR0yDE3je1IK54HmYnigNIMsCyUAl8xlQ8LtTQpMkUAje8kygEFAKwi
Xxc5nek4eYafP0zGkbmCzTsVuD3VHdArFjrJLNYVKgnfLW2ckZwGiaoy4S6NhWw33wRVgnmgEiiKFtiefCS4AImriUme6PbUiDjFm
XboxngpeUZkpL3OVPHcyQke7oyhmbbEh2dLQmDRENXBFj6T5WvLRcuzPzWKscWVBDEcS0jROKaqEIRvQ6eVLAokBBKFGAOBHKLmp9
ErPIisLYgRJ8IR2u7QOMxGNi6k6hs9tOWth3OM6TC0rOTQfvpz6IIzVTXBEQomQl1kWVcPwTqv2gdmTa6dC9x2PaS4qmqS5txyXer
SnYSsxGG6oebPBiGg5X0tMEsypWRYNu7bxfBvixZfRpFCBKnHSwtYb0vecLKHnvCC1OJsUOy5Skrf5XDzVYMdcCMxBhOxsv3iB5jR
XWD0YHoW3os9zOQYfbJBUKUqewm9gpHFdsPjibNYXDtFnO59Mur84fTkoy0IiYCdTE3dhleuofWTg72UpgqrmiAL4AOC99vxhHHZA
QOlal5GQaui90qp0Xm63jXnKGXbnDaeVuWh6SeNbh6Z52AL8wRmNrLKV9hlUYrPNK8QEmYDUciLoTkill6CPCbvtE5zdlRo1iQPS9
r17vezEuQIn59wGRY8RXXXF0wQNAT9rvIbznZZ7D0jdv9AmVle46YAMlyYdD01s1n5MfZ5oYy7vWfA0SXrn0bXlSNAy7j2zTHMkG6
1zVTfB4dyxtCxPGlQZhcd0xFOWz8SOVP3F7upj2O7TAcYfkgoehYLNcSd4UvJP7C2PjNL6ELILe0uBjITIOw2NpgWAWii8Qcx2wTA
From Ancient Greece to the modern day, people have been using increasingly complex codes and ciphers with the intention of communicating secretly and keeping information secure. Enigma was one such cipher. Students will enjoy the rare opportunity to use a genuine Enigma machine as well as encountering a range of historical codes and ciphers as they work together to decipher messages in order to solve a puzzle. This session includes an Enigma machine demonstration.
During this session students will:
Increase their knowledge of codes and ciphers and their uses throughout history.
Develop their understanding of the role that ciphers played during WW2, with specific reference to the Enigma machine and the wider operations of Bletchley Park.
Use and develop team working, problem-solving and mathematical thinking skills, applying them to a practical codebreaking task.
Subject Focus: Maths
Additional curriculum links: History
It is 1941 and the Battle of the Atlantic is at its height. Numerous convoys of essential supplies are being sunk by German Wolf packs and Britain is close to surrender. In the role of codebreakers students will intercept and decipher German Naval communications in order to plan a strategy to get the next convoy safely to Liverpool. This session includes an Enigma machine demonstration.
During this session students will:
Develop their knowledge and understanding of WWII events and the role of Bletchley Park in the Battle of the Atlantic.
Briefly describe the process of decryption at Bletchley Park, from when a message is first intercepted until the intelligence is used.
Apply team working, problem-solving and strategic thinking skills to obtain and apply scenario-based intelligence.
Students will also have the opportunity to see an Enigma machine and have a go at Morse code.
Subject Focus: History
Additional curriculum links: Geography, Maths
It is the early hours of 6th June 1944. Weather prevented Operation Overlord commencing in the early hours of June 5th so today is the best, and perhaps last, chance the Allies have of beginning the invasion of German-occupied Western Europe. Numerous deception plans have been put into place to fool the enemy and protect Allied troops. In the role of codebreakers students will intercept and decipher German communications in order to decide if the deception plans have been successful and whether it is safe to proceed with the invasion. This session includes an Enigma machine demonstration.
During this session students will:
Develop their knowledge and understanding of WW2 events and the role of Bletchley Park in the D-Day landings.
Briefly describe the process of decryption at Bletchley Park, from when a message is first intercepted until the intelligence is used.
Apply team working, problem-solving and strategic thinking skills to obtain and apply scenario-based intelligence.
Subject Focus: History
Additional curriculum links: Geography, Maths
All connected devices use password logins, and new apps and devices are increasingly including fingerprint and facial recognition technology. Your students use them all day, every day, but do they have any ideas how these technologies actually work? This workshop allows students to apply a wide range of the mathematic principles they are learning at school, whilst thinking about their own personal cyber security.
Through discussion, interactive demonstrations and practical activities, students will:
Consider the devices and apps they use that are secured using logins.
Establish mathematically why the best passwords are random, complex and long.
Apply their knowledge of geometry to investigate how biometric sensors use angles, lengths and ratios to identify unique individuals.
Subject Focus: Computing
Additional curriculum links: Maths
This session does not include an Enigma machine demonstration.
Combine your new cyber security knowledge with code-breaking skills with the safe cracking challenge. Groups of students work as a team to solve six puzzles leading to the combination of a locked safe containing a secret prize.
Through practical activities, students will:
Decode a hash algorithm.
Brute-force attack a weak password created using personal data.
Apply the mathematics of biometrics.
Investigate binary pixels
Send and receive an encrypted message using a radio.
Subject Focus: Computing
Additional curriculum links: Maths
This session does not include an Enigma machine demonstration.
Our lives are becoming ever more digitally connected. Year 8 and 9 students are making their way into this brave new world. But how prepared are they to do this in a way that keeps their personal data and devices secure?
Through discussion, interactive demonstrations and practical activities, students will:
Consider their individual digital world – looking at the devices, apps and data they value.
Identify where weakness in their personal cyber security exist and how criminals might exploit these.
Learn practical ways to improve their cyber security.
Create a plan of action that is unique to them.
Subject Focus: Computing
Additional curriculum links: Maths
This session does not include an Enigma machine demonstration.
+44 (0) 1908 640404
Our team is happy to answer any queries 9.30 – 16.45, Monday to Friday.
To book a learning visit, please use the Learning Booking Form.
Enquiries
Any queries submitted through the contact form will be responded to as soon as possible.