Nmap Vulnerability Scanning Made Easy: Tutorial