Mostrar el registro sencillo del ítem
Tutorials of how to use Metasploit, Nessus and Nmap
dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Duffany, Jeffrey | |
dc.contributor.author | Adames Méndez, Obed A. | |
dc.date.accessioned | 2020-07-30T19:24:46Z | |
dc.date.available | 2020-07-30T19:24:46Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Adames Méndez, O. A. (2012). Tutorials of how to use Metasploit, Nessus and Nmap [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/481 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration field. These tutorials are will provide basic understanding on the functionalities and capabilities of each particular tool. Currently there are many different ways to protect our systems. However none of them are 100% secure. We may have severe vulnerabilities in our system and may not be aware of it. Testing our systems for vulnerabilities is something that we should not overlook. The purposed of these tutorials is to give an overview of the free security tools that are available and that we can use to verify the integrity and the security of a network. We will also demonstrate how vulnerabilities can be exploited using this tools. Key Terms - Computer Security, Network Scan, Penetration Testing, Vulnerability. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Engineering; | |
dc.relation.ispartofseries | Spring-2012; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Computer security | en_US |
dc.subject.lcsh | Penetration testing (Computer security) | en_US |
dc.subject.lcsh | Computer networks--Security measures | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | Tutorials of how to use Metasploit, Nessus and Nmap | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Computer Engineering
Artículos de Proyectos de Ingeniería en Computadoras