Dear Grok Academy users,
We're updating the Grok Academy Terms of Use and associated policies to address updates to our product
We've outlined the main changes below.
  • We updated the ownership of the Grok Platform to KIK Innovation Limited.
  • We have added a third party customer support provider to our list of sub-processors (HubSpot).
  • We have added a list of all sub-processors Grok uses that includes detail on what the purpose of the data collection is and where your data is stored.
  • Minor updates to policy wording to ensure accuracy.
The updated Terms of Use and policies will go into effect on 1 September 2025. You can read the complete updated Terms of Use and policies by visiting the link above.
By continuing to use Grok Academy past 1 September 2025, you accept the updated Terms of Use and acknowledge receipt of the updated policies. If you don't agree, you'll need to stop using Grok Academy and delete your account by following the instructions found here.

Thank you for using Grok Academy, your home for Digital Technologies education.

Cryptography - Python

Course badge for Cryptography - Python
Course
Topics
Cyber Security
Technologies
Python

Learn the techniques and code to start you on your way to becoming a cyber security expert!

Cryptography - Python

This Challenge introduces basic cryptography concepts in relation to data representation and securing online communication, and how these are implemented through code. It teaches programming in the context of classic cryptographic ciphers like rotation, XOR and mixed-substitution, and explains the techniques used to break these forms of encryption.

If you are looking for an alternative program that does not require any programming, we suggest using the Cryptography course.

Hear from cyber security experts who share what it's like to work in the cyber security industry, and how the skills and knowledge you learn through these activities can set you up for an exciting career after school.

This Challenge is a part of the Schools Cyber Security Challenges series, developed by the Australian Computing Academy in partnership with AustCyber, ANZ, BT, Commonwealth Bank, NAB and Westpac.

Australian Curriculum v9 Content Descriptions

This course is designed to support your lesson planning. While comprehensive, individual resources may not cover every aspect of a content description. We recommend reviewing each resource to determine how it best fits your teaching objectives.

What's Next?

Finished this course? Check out : Network Security

Your current score is: 0 points.

Please log in or register to access this course.

This course is free for Australian and Aotearoa New Zealand users.

Module Progress
1.
Representing Data
2.
Rotation ciphers
3.
Frequency analysis
4.
Encrypting with binary
1.
Representing Data
2.
Rotation ciphers
3.
Frequency analysis
4.
Encrypting with binary
1.
Representing Data
2.
Rotation ciphers
3.
Frequency analysis
4.
Encrypting with binary