Dear Grok Academy users,
We're updating the Grok Academy Terms of Use and associated policies to address updates to our product
We've outlined the main changes below.
  • We updated the ownership of the Grok Platform to KIK Innovation Limited.
  • We have added a third party customer support provider to our list of sub-processors (HubSpot).
  • We have added a list of all sub-processors Grok uses that includes detail on what the purpose of the data collection is and where your data is stored.
  • Minor updates to policy wording to ensure accuracy.
The updated Terms of Use and policies will go into effect on 1 September 2025. You can read the complete updated Terms of Use and policies by visiting the link above.
By continuing to use Grok Academy past 1 September 2025, you accept the updated Terms of Use and acknowledge receipt of the updated policies. If you don't agree, you'll need to stop using Grok Academy and delete your account by following the instructions found here.

Thank you for using Grok Academy, your home for Digital Technologies education.

Teaching Cyber Security

Free - no account required

Created for Years 7-8, 9-10, 11, 12

Duration: 1 hour

In this webinar, Bruce and James explain how the Schools Cyber Security Challenges can be used to teach Cyber Security alongside Digital Technologies.

Join Bruce Fuda and A/Prof James Curran as they demonstrate the different topics and features of the Schools Cyber Security Challenges, and some of the unplugged classroom activities you can do to complement the Challenges.

View

Linked Resources

Teaching coding online: Secondary

In this webinar, James and Owen give you a rundown on how you can use the Grok Academy resources to teach programming online in a high school context.

Data encryption

Learn how data is protected using encryption.

Cyber Security card game: Know your risks

What information is safe to share online? These cards will help you understand the risks.

Web application security

Find out how developers keep the websites you visit safe and secure.

Network security

Learn how networks secure our data during transmission.