Conduct Vulnerability Assessments of Network and Security Devices using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Conduct penetration test and launch exploits using tools,…