This report discusses the use of network security tools like nmap and metasploit for identifying network threats and mitigating them. It also covers threat mitigation techniques like network segmentation, deployment of a firewall, application of patch, encryption of the network channel, and creation of VPN channel. The report provides a detailed literature review and a conclusion on the effectiveness of these tools and techniques.