All rights reservedDuffany, JeffreyAdames Méndez, Obed A.2020-07-302020-07-302012Adames Méndez, O. A. (2012). Tutorials of how to use Metasploit, Nessus and Nmap [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.http://hdl.handle.net/20.500.12475/481Design Project Article for the Graduate Programs at Polytechnic University of Puerto RicoAbstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration field. These tutorials are will provide basic understanding on the functionalities and capabilities of each particular tool. Currently there are many different ways to protect our systems. However none of them are 100% secure. We may have severe vulnerabilities in our system and may not be aware of it. Testing our systems for vulnerabilities is something that we should not overlook. The purposed of these tutorials is to give an overview of the free security tools that are available and that we can use to verify the integrity and the security of a network. We will also demonstrate how vulnerabilities can be exploited using this tools. Key Terms - Computer Security, Network Scan, Penetration Testing, Vulnerability.enComputer securityPenetration testing (Computer security)Computer networks--Security measuresPolytechnic University of Puerto Rico--Graduate students--ResearchTutorials of how to use Metasploit, Nessus and NmapArticlePolytechnic University of Puerto Rico, Graduate School