How to Scan for Vulnerabilities With Nmap (Steps & Definition)