Master's Student | Digital Forensics | AI Security | Immersive Training
I'm Agnieszka (Aga) Sawrasewicz, a graduate student at SIU researching digital evidence, adversarial AI attacks, and building interactive VR/web experiences that make cybersecurity training engaging and practical.
Toolkit: WinPmem • FTK Imager • Wireshark • Python • A-Frame • Unity • SHAP/LIME • Autopsy
Mission: Help people learn, defend, and explore safely in the digital era through human-centered security solutions.
View Full ResumeImmersive 3D game with 30 interactive challenges teaching cryptography and ethical hacking concepts through exploration.
30 Challenges · Cryptography · Ethical Hacking · Night Sky Environment
Start QuestEducational 3D environment teaching Network Forensics and Incident Response through 5 interactive learning stations with quizzes.
SOC Training · Triage · Hash Lab · PBX Security · Interactive Learning
Enter TrainingVR & web cybersecurity training game with threat map, missions, and interactive quizzes.
Blue/Red Team · Threat Intelligence · Mission-Based Learning
Visit SiteAnimated visualization of behavioral learning, co-learning AI, and immersive simulation integration.
Research Framework · Behavioral Learning · AI Co-Learning
View AnimationProfessional digital forensics modules for RAM capture, USB imaging, and comprehensive reporting.
Evidence Collection · Chain of Custody · Professional Reports
Enter TrackerInteractive quiz covering digital forensics chapters 1-5 with flashcards and score tracking.
Study Tool · Gamified Learning · Progress Tracking
Play QuizForensic analysis of Unicode and encoding manipulations in large language models.
AI Security · Unicode Exploitation · LLM Vulnerabilities
Open AnalysisEducational visualization explaining P2P evolution from Napster to blockchain networks.
Distributed Systems · Network Security · Blockchain
Explore P2PInteractive quiz and visualization for understanding arrival rates, service rates, and network congestion.
Advanced Networking · Queueing Models · Performance Analysis
Learn QueueingInteractive flow diagram showing how investigators trace stolen digital funds across blockchains.
Blockchain Analysis · Cryptocurrency Tracing · Law Enforcement
Trace FundsInteractive demonstration of Pretty Good Privacy encryption and decryption processes.
Cryptography · Public Key Infrastructure · Secure Communication
Try DemoVirtual hacker workspace rendered entirely in the browser with retro monitors and desk setup.
WebGL · 3D Modeling · Browser-Based VR
Enter RoomBeyond research and code, I'm guided by curiosity and creativity. I love combining nature with technology — hiking forests one day, shaping VR worlds the next. My approach to cybersecurity is human-centered, believing that the best security comes from understanding people, not just technology.
My long-term goal is to design tools and training experiences that help people learn, defend, and explore safely in the digital age, making complex security concepts accessible and engaging for everyone.
Explore My JourneyOpen to internships, research collaborations, and junior roles in cybersecurity, digital forensics, or AI security.
Southern Illinois University
Master's in Cybersecurity