This document provides a step-by-step guide on how to perform a vulnerability scan on a network. It covers the installation and configuration of Nmap and Nessus, as well as the analysis of the scan results. The main requirement of the assignment is to perform a vulnerability scan on the network and identification of the steps essential for performing the scan.