vulnerability assessment tutorial