Discuss how some open-source tools (e.g., Nmap) are useful within cybersecurity (analysis, response, forensics, or administration) and why it is valuable for a cyber professional to become familiar with a variety of open-source tools.