Tutorials of how to use Metasploit, Nessus and Nmap

Thumbnail Image

Date

2012

Journal Title

Journal ISSN

Volume Title

Publisher

Polytechnic University of Puerto Rico

Abstract

Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration field. These tutorials are will provide basic understanding on the functionalities and capabilities of each particular tool. Currently there are many different ways to protect our systems. However none of them are 100% secure. We may have severe vulnerabilities in our system and may not be aware of it. Testing our systems for vulnerabilities is something that we should not overlook. The purposed of these tutorials is to give an overview of the free security tools that are available and that we can use to verify the integrity and the security of a network. We will also demonstrate how vulnerabilities can be exploited using this tools. Key Terms - Computer Security, Network Scan, Penetration Testing, Vulnerability.

Description

Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico

Keywords

Citation

Adames Méndez, O. A. (2012). Tutorials of how to use Metasploit, Nessus and Nmap [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.

Endorsement

Review

Supplemented By

Referenced By