You will get Thorough Quality Assurance Report

Project details
1. Analyze requirements from the software requirement specification document.
2. Create a clear test plan.
3. Write test cases that cover all the requirements defined in the document.
4. Get test cases reviewed by the QA lead (If any).
5. Execute test cases and detect any bugs.
6. Report bugs, if any, and once fixed, run the failed tests again to re-verify the fixes.
2. Create a clear test plan.
3. Write test cases that cover all the requirements defined in the document.
4. Get test cases reviewed by the QA lead (If any).
5. Execute test cases and detect any bugs.
6. Report bugs, if any, and once fixed, run the failed tests again to re-verify the fixes.
Testing Type
Game TestingDevice
PC, Linux, iPhone, Android Mobile PhoneWhat's included
Service Tiers |
Starter
$100
|
Standard
$200
|
Advanced
$300
|
---|---|---|---|
Delivery Time | 2 days | 5 days | 7 days |
Number of Revisions | 3 | 3 | 3 |
Summary Report | |||
Annotated Screenshots | |||
Responsiveness Testing | |||
Vulnerability Testing | |||
Functionality Testing | |||
Usability Testing | |||
Browser Compatibility Testing | |||
Performance/Load Test |
7 reviews
(6)
(1)
(0)
(0)
(0)
This project doesn't have any reviews.
KA
Kwame A.
Apr 22, 2025
Short Survey Participant for Phd Research (10 minute survey)
Muhammad was very helpful completed on time and offered feedback
YC
Yan C.
Apr 15, 2024
Software Architectural Overview Write Up
CN
Clinton Innocent Chinedu N.
Sep 8, 2023
Cryptography
He is good at what he does, I highly recommend him dont hesitate to hire him. Thanks for the good work.
MA
MUMINJON A.
Apr 8, 2023
CTF - Binary Exploitation Write-Up
Professional. Would hire him again! Thanks
AH
Alton H.
Oct 15, 2022
IT Course Content Creator
The test project was completed successfully and on time.
About Muhammad
Top Rated | Cyber Security & AI Specialist | Project Manager
100%
Job Success
Rawalpindi, Pakistan - 7:16 am local time
I’m Alliyan, a Cyber Security Specialist with a strong interest in Artificial Intelligence and Machine Learning, as well as experience managing projects. With over four years in the industry, I offer a range of services to protect businesses from cyber threats and successfully manage cybersecurity and AI/ML projects. My services include:
Cybersecurity Expertise:
Vulnerability Assessments: Identifying weaknesses in your systems and providing solutions.
Penetration Testing: Simulating cyberattacks to find security flaws in your networks and infrastructure.
Security Audits: Conducting thorough checks to ensure compliance with industry standards.
Risk Assessments: Identifying and prioritizing risks, along with actionable recommendations.
Incident Response: Offering fast and effective responses to security breaches or cyber incidents.
Security Awareness Training: Educating employees to recognize and prevent cyber threats.
Regulatory Compliance: Ensuring adherence to standards like HIPAA, PCI DSS, GDPR, and more.
Security Policy Development: Creating policies to protect your organization comprehensively.
Mobile Device Security: Protecting mobile devices from cyber threats.
AI/ML Integration: Using AI and Machine Learning for advanced threat detection and response.
Project Management Skills:
Project Planning & Execution: Managing cybersecurity and AI/ML projects from start to finish, ensuring they are completed on time and within budget.
Team Coordination: Working with different teams to meet project goals.
Risk Management: Identifying project risks and addressing them to avoid delays.
Client Communication: Keeping clients updated on progress and meeting expectations.
Agile & Waterfall Methods: Adapting project management approaches to fit client needs.
Background:
I have a Bachelor’s degree in Cyber Security from Air University Islamabad, where I studied subjects like programming, cryptography, web security, ethical hacking, and AI/ML. Over the past three years on Fiverr, I have successfully delivered customized solutions to clients. I’ve also managed projects focused on malware detection, code obfuscation, and the use of AI/ML in cybersecurity.
I am committed to delivering high-quality cybersecurity services and managing projects effectively to ensure successful outcomes.
Best regards,
Alliyan
Steps for completing your project
After purchasing the project, send requirements so Muhammad can start the project.
Delivery time starts when Muhammad receives requirements from you.
Muhammad works on your project following the steps below.
Revisions may occur after the delivery date.
Testing steps
1. Analyze requirements 2. Create a clear test plan 3. Write test cases that cover all the requirements defined in document 4. Get test cases reviewed 5. Execute test cases and detect any bugs 6. Report bugs