The author has worked as a Computer Forensic expert in private sectors whereas, he solved multi problems that happen at the industrial level. However, the Author holds a Master’s degree in Computer...view moreThe author has worked as a Computer Forensic expert in private sectors whereas, he solved multi problems that happen at the industrial level. However, the Author holds a Master’s degree in Computer Science and Author’s holds national and international certifications in cyber security, i.e. CISCO, HUAWEI, CEH and Red hat. The author is affiliated with online training programs and having good commands in Information Security. The author also worked as bug bounty programs of multi-national companies. He is multidimensional in Information Technology and currently working as Assistant Manager (IT) in a private sector’s firm.view less