PROTECT YOUR WIRELESS NETWORK
HOW TO PROTECT EQUIPMENT & PAPER FILES
HOW TO PROTECT DATA ON YOUR DEVICES
HOW TO PROTECT YOUR BUSINESS
Information Researcher, Computer Forensics and Mobile Forensics Investigator, Linux Architect (Red Hat), Networking and Network Security Expert (Cisco) Having more than 9ย years of experience in Ethical Hacking, Network Security, Computer Forensics, Vulnerability Assessment, Penetration Testing, Red Hat Enterprise Linux, Cisco Router and Switch and Service Providerย , Pursued his bachelor of technology from Punjab Technical University, with multiple highest level of certification from worldโs leading organizations.ย
ย Conducted more than 200 different training sessions on various topics related to Cyber Security, Ethical Hacking, Forensic Investigations, Linux and Network Security to an audience comprising Studentsย
ย ย ย ย ย My research interests include Computer Security, Networking and Network Security, Data Forensic, and Information Security.ย
ย ย ย ย ย Specialties: Cyber Security, Vulnerability and Penetration Testing, Ethical Hacking, Cyber Crime Investigation, Server Administration, Digital Forensics,