Qué está incluido
10 reuniones en vivo
10 horas presencialesTarea
1 hora por semana. Students will have the opportunity to solve short ciphers and coded messages between class sessions. I will provide the encoded messages which I will create with the methods we discuss in class. This work is not graded, unless families choose to have a graded option.Evaluación
Learner progress is generally assessed through informal assessment of participation in discussions (including chat involvement). For families who want or need a letter grade, I will provide an option to do that.Calificación
incluidoExperiencia de clase
Nivel de inglés: desconocido
Grado de EE. UU. 8 - 11
Nivel Beginner
Forensic Science 5 will focus heavily on cryptology from ancient methods, which seem almost mystical, to modern computer-based double-encryption systems. With each code-making approach, students will have the opportunity to use known techniques and suggest variations to add complexity. I will provide small sections of coded messages, with hints about methodologies used, so that the students can try their hands at deciphering each hidden message. Along the way, we will cover encoded messages from real cases, with emphasis on the massive body of ciphers and coded messages from the Zodiac case, which students who have taken previous installments of my Forensic Science series know is my specialty. After completing an overview of historical and modern cryptologic techniques, we will shift gears and examine methods of investigating cyber crimes. Interwoven in the course will be cipher-based mock crime. Topics (one week each) will include: 1. Ancient cryptologic methods and concepts, including gematria, temurah (particularly the atbash cipher), notarikon, and isopsephy. 2. Pre-modern techniques of the simple kind, including grid-based ciphers, rigid alphabet rearrangement, created symbols, and attempts to appear magical. 3. Pre-modern techniques of the complex kind, including cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, mixing numbers of digits, creating symbols and sigils. 4. The small ciphers, old and new: one-time pad encryptions, short bursts of enciphered text, and figurate expressions. 5. Approach to solving substitution ciphers. 6. In-class ciphers to solve (4 weeks) 7. Investigation of cyber crimes: methods and agencies involved in the analysis of computer-based crimes, from low-level hacking, to large-scale ransomware attacks and international cyber attacks aimed at power grids or government structures. Teaching methods and class structure: As with my other forensic science classes, this class will focus on the Socratic Method. I will provide materials and images and lead discussions aimed at fostering critical and analytical thinking. Cryptology is a particularly appropriate subject when working on expanding one's thinking. I am very laid back, and encourage my students to feel confident in their own ideas. All students will have extensive opportunities to interact with me and with other students. Discussion will be a cornerstone of our exploration of the topics covered. Required experience: None, quite simply. Students do not have to have completed any of the previous Forensic Science classes in the series. They are numbered, but they each cover distinct topics within the field.
Metas de aprendizaje
Students will learn about a wide variety of code-making techniques, ranging from ancient uses of images and numbers to modern complex encryptions.
Programa de estudios
10 Lecciones
más de 10 semanasLección 1:
Ancient Cryptology
Methods include Gematria, Temurah, and Notarikon. We will work through a few simple codes using these methods.
60 minutos de lección en vivo en línea
Lección 2:
Simple Pre-modern Techniques
Grid-based ciphers, rigid alphabet substitution, created symbols, and attempts to appear magical.
60 minutos de lección en vivo en línea
Lección 3:
Complex Pre-modern Techniques
Cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, and sigils.
60 minutos de lección en vivo en línea
Lección 4:
Small Ciphers
One-time pad encryptions, short bursts, figurate expressions.
60 minutos de lección en vivo en línea
Otros detalles
Orientación para padres
While we will talk about ciphers from real criminal cases, we will not cover any graphic or inappropriate content from any cases.
Recursos externos
Los estudiantes no necesitarán utilizar ninguna aplicación o sitio web más allá de las herramientas estándar de Outschool.
Fuentes
While it is not required for class, students who are highly interested in cryptology may want to get a copy of David Kahn's "The Codebreakers." This should be available at many libraries. It has many editions, and I have gotten an older copy (which was a goldmine for a cryptologic analysis I completed). Again, though this is not required.
Experiencia y certificaciones del docente
While we do not cover a sensitive topic, I do want to discuss my expertise. I have been teaching forensic science up through the college level since 2005, and have been heavily involved in cryptologic analysis for roughly 7 years. In February of 2022, I submitted an exhaustive cryptanalysis of the entire body of Zodiac writings to the FBI for review. Based on this work, which has never been completed previously, I believe it is reasonable to state that I am the leading expert of the Zodiac's use of ancient cryptologic techniques.
Reseñas
Curso grupal en vivo
140 US$
por 10 clases1 x por semana, 10 semanas
60 min
Completado por 72 alumnos
Videoconferencias en vivo
Edades: 12-17
3-17 alumnos por clase
Asistencia financiera
Tutoría
Más para explorar
Calmando tu Sonic InternoMe encantan las matemáticasMagnetismoClase privada de ukeleleEscultura adolescenteClavosCantando cuando estas ganandoRasca un maratónPedos, pedos y más pedosAprendiendo la multiplicaciónCampo de la geologíaTutor de matemáticas y geometríaAprende inglés para principiantesMeditación conscientePapel