ESP Biography
TRAVIS HASSLOCH, Computer Security Professional
Major: Computer Science College/Employer: VISA is my employer Year of Graduation: 1995 |
|
Brief Biographical Sketch:
I have been a cryptographer for a well-known online payments company, a network security specialist for the largest network operations security center in the world, and an application security specialist for the most widely-used piece of software in the world. Past Classes(Clicking a class title will bring you to the course's section of the corresponding course catalog)M2155: Code Making and Breaking (Math Rules Cyberspace) in Splash! Spring 2012 (Apr. 21 - 22, 2012)
Learn how to make and break codes you can use with friends on SMS, email, or IM. See how it is used by spies to hide messages, by the military to win wars, by hackers to break into wireless networks, by web sites to protect their users, by banks to protect their money, by people to cheat at online poker, and by individuals to protect their privacy. It will be fun, not difficult, but I will give you all the information you need to advance as far as you want afterwards.
M1287: Code Making and Breaking: Math Rules Cyberspace in Splash! Spring 2011 (Apr. 16 - 17, 2011)
Learn how to make and break codes you can use with friends on SMS, email, or IM. See how it is used by spies to hide messages, by the military to win wars, by hackers to break into wireless networks, by web sites to protect their users, by banks to protect their money, by people to cheat at online poker, and by individuals to protect their privacy. It will be fun, not difficult, but I will give you all the information you need to advance as far as you want afterwards.
M1172: Code Making and Breaking: Math in Cyberspace in Splash! Fall 2010 (Nov. 13 - 14, 2010)
In this class we'll cover classical cryptography (encryption) and cryptanalysis (code-breaking), and show how this applies to security on the Internet. All of our examples are simple enough to be done on pencil and paper, so no special knowledge is required. We'll start simple and work our way up to a cipher that was used to protect the secrets of the atomic bomb.
|