The report discusses different computer security tools like Snort, Nessus, and Honey Pot for detecting vulnerabilities and securing networks from external breaches. It also covers the installation and deployment of these tools and the penetration techniques used for analysing security vulnerabilities. The report concludes with the importance of finding flaws in the current system and eliminating the vulnerabilities identified in the current system.