Conduct Vulnerability Assessments of Network and Security Devices using various open source and commercial tools Map out a network, discover ports and…