Outschool
Abrir configuración de moneda, zona horaria e idioma
Iniciar sesión

Ciencia forense: criptología y delitos cibernéticos

En esta clase de 10 semanas, los estudiantes aprenderán sobre una amplia gama de técnicas de creación y descifrado de códigos y los métodos utilizados para investigar delitos cibernéticos. #académico
Thomas Jones
Puntuación media:
4.9
Número de reseñas:
(1,204)
Clase

Qué está incluido

10 reuniones en vivo
10 horas presenciales
Tarea
1 hora por semana. Students will have the opportunity to solve short ciphers and coded messages between class sessions. I will provide the encoded messages which I will create with the methods we discuss in class. This work is not graded, unless families choose to have a graded option.
Evaluación
Learner progress is generally assessed through informal assessment of participation in discussions (including chat involvement). For families who want or need a letter grade, I will provide an option to do that.
Calificación
incluido

Experiencia de clase

Nivel de inglés: desconocido
Grado de EE. UU. 8 - 11
Nivel Beginner
Forensic Science 5 will focus heavily on cryptology from ancient methods, which seem almost mystical, to modern computer-based double-encryption systems.  With each code-making approach, students will have the opportunity to use known techniques and suggest variations to add complexity.  I will provide small sections of coded messages, with hints about methodologies used, so that the students can try their hands at deciphering each hidden message.  Along the way, we will cover encoded messages from real cases, with emphasis on the massive body of ciphers and coded messages from the Zodiac case, which students who have taken previous installments of my Forensic Science series know is my specialty.  After completing an overview of historical and modern cryptologic techniques, we will shift gears and examine methods of investigating cyber crimes.  Interwoven in the course will be cipher-based mock crime.

Topics (one week each) will include:
1.  Ancient cryptologic methods and concepts, including gematria, temurah (particularly the atbash cipher), notarikon, and isopsephy.
2.  Pre-modern techniques of the simple kind, including grid-based ciphers, rigid alphabet rearrangement, created symbols, and attempts to appear magical.
3.  Pre-modern techniques of the complex kind, including cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, mixing numbers of digits, creating symbols and sigils.
4.  The small ciphers, old and new: one-time pad encryptions, short bursts of enciphered text, and figurate expressions.
5.  Approach to solving substitution ciphers.
6.  In-class ciphers to solve (4 weeks)
7.  Investigation of cyber crimes: methods and agencies involved in the analysis of computer-based crimes, from low-level hacking, to large-scale ransomware attacks and international cyber attacks aimed at power grids or government structures.

Teaching methods and class structure:  As with my other forensic science classes, this class will focus on the Socratic Method.  I will provide materials and images and lead discussions aimed at fostering critical and analytical thinking.  Cryptology is a particularly appropriate subject when working on expanding one's thinking.  I am very laid back, and encourage my students to feel confident in their own ideas.  

All students will have extensive opportunities to interact with me and with other students.  Discussion will be a cornerstone of our exploration of the topics covered.

Required experience:  None, quite simply.  Students do not have to have completed any of the previous Forensic Science classes in the series.  They are numbered, but they each cover distinct topics within the field.
Metas de aprendizaje
Students will learn about a wide variety of code-making techniques, ranging from ancient uses of images and numbers to modern complex encryptions.
objetivo de aprendizaje

Programa de estudios

10 Lecciones
más de 10 semanas
Lección 1:
Ancient Cryptology
 Methods include Gematria, Temurah, and Notarikon.  We will work through a few simple codes using these methods. 
60 minutos de lección en vivo en línea
Lección 2:
Simple Pre-modern Techniques
 Grid-based ciphers, rigid alphabet substitution, created symbols, and attempts to appear magical. 
60 minutos de lección en vivo en línea
Lección 3:
Complex Pre-modern Techniques
 Cipher wheels, early substitution OR transposition ciphers, alphanumeric codes, and sigils. 
60 minutos de lección en vivo en línea
Lección 4:
Small Ciphers
 One-time pad encryptions, short bursts, figurate expressions. 
60 minutos de lección en vivo en línea

Otros detalles

Orientación para padres
While we will talk about ciphers from real criminal cases, we will not cover any graphic or inappropriate content from any cases.
Recursos externos
Los estudiantes no necesitarán utilizar ninguna aplicación o sitio web más allá de las herramientas estándar de Outschool.
Fuentes
While it is not required for class, students who are highly interested in cryptology may want to get a copy of David Kahn's "The Codebreakers." This should be available at many libraries. It has many editions, and I have gotten an older copy (which was a goldmine for a cryptologic analysis I completed). Again, though this is not required.
Se unió el January, 2017
4.9
1204reseñas
Perfil
Experiencia y certificaciones del docente
While we do not cover a sensitive topic, I do want to discuss my expertise.  I have been teaching forensic science up through the college level since 2005, and have been heavily involved in cryptologic analysis for roughly 7 years.  In February of 2022, I submitted an exhaustive cryptanalysis of the entire body of Zodiac writings to the FBI for review.  Based on this work, which has never been completed previously, I believe it is reasonable to state that I am the leading expert of the Zodiac's use of ancient cryptologic techniques.

Reseñas

Curso grupal en vivo
Compartir

140 US$

por 10 clases
1 x por semana, 10 semanas
60 min

Completado por 72 alumnos
Videoconferencias en vivo
Edades: 12-17
3-17 alumnos por clase

Acerca de
Apoyo
SeguridadPrivacidadPrivacidad de CAPrivacidad del alumnoAdministrar preferencias de datosTérminos
Obtener la aplicación
Descargar en la App StoreDescargar en Google Play
© 2024 Outschool