Chuck Easttom, Computer Scientist, Author, and Educator
This course is an overview of modern cryptography algorithms and will describe asymmetric algorithms such as DES, 3DES, AES, and Blowfish as well as asymmetric algorithms such as RSA, Diffie-Hellman, and Elliptic Curve.
Chuck Easttom is the author of 11 computer science books including 2 computer security textbooks used at universities around the globe and translated into several languages. He also holds a host of IT certifications including MCP, MCSA, MCSE, MCAD, MCTS (Windows 7, Windows Server 2008, SQL Server 2008, and Visual Studio 2010), MCITP (Windows 7 and SQL Server 2008), MCDBA, MCT, A+, Network+, Linux+,iNet+, Server+, CEH, CHFI, ECSA, CEI, and CISSP. He currently has 7 provisional patents, all related to computer science and 4 related to computer security. One of those patents regards a new method of steganography, another regards a new approach to detecting spyware, and yet another involves the invention of a new, more stable file system.
He is also the inventor of a method for quantifying network security that is being taught at several universities, and most recently has developed a new approach to creating ghost drives. He has taught various security related courses for several years and has over 10 years of teaching experience. He is also a frequent consultant on various computer related court cases including both criminal and patent cases. While Mr. Easttom has a broad range of security expertise, his passion has always been cryptography