My name is Ray Chambers. I'm a specialist in computing and have a first class honours degree in computer science. I'm currently the lead teacher of computer science at Brooke Weston Academy in Corby Northamptonshire. I have been teaching for roughly 8 years and I thoroughly enjoy my job. In 2015 I was fortunate to win the Pearson National Teaching Award for innovative use of technology. I also won the BAFTA for mentoring young coders.

Last updated

22 February 2018

docx, 44.97 KB
docx, 44.97 KB
png, 49.27 KB
png, 49.27 KB
pptx, 6.02 MB
pptx, 6.02 MB
Objective: - We鈥檙e learning to identify different network infrastructures and the encryption involved.

During this lesson there are some videos to break up the lesson and teaching notes for you to have a look at. On top of this there are some activities for them to try such as creating their own encryption key. This usually makes the lesson more engaging for the students.

Content covered in this lesson: -
Topologies
Ring
Star
Bus
Mesh

Students to draw the network topologies and explain the advantages and disadvantages.

Wifi and wifi channels

Encryption using the Caesar shift and also comments on brute force.

Public and private keys used in encryption.

Reviews

Something went wrong, please try again later.

This resource hasn't been reviewed yet

To ensure quality for our reviews, only customers who have purchased this resource can review it

to let us know if it violates our terms and conditions.
Our customer service team will review your report and will be in touch.