and what a port scan attack does, it's time to get down to the tools and techniques used by cybersecurity analysts and ...