Tutorials of how to use Metasploit, Nessus and Nmap
Date
2012
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Polytechnic University of Puerto Rico
Abstract
Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration field. These tutorials are will provide basic understanding on the functionalities and capabilities of each particular tool.
Currently there are many different ways to protect our systems. However none of them are 100% secure. We may have severe vulnerabilities in our system and may not be aware of it. Testing our systems for vulnerabilities is something that we should not overlook.
The purposed of these tutorials is to give an overview of the free security tools that are available and that we can use to verify the integrity and the security of a network. We will also demonstrate how vulnerabilities can be exploited using this tools.
Key Terms - Computer Security, Network Scan, Penetration Testing, Vulnerability.
Description
Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico
Keywords
Citation
Adames Méndez, O. A. (2012). Tutorials of how to use Metasploit, Nessus and Nmap [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.