Log in to get started!

Don't have an account yet? You can create one below.

Student Instructor


intentional and malicious encroachment by an outside actor on computer networks, websites, or other cyber infrastructure; often aims to collect military and political intelligence, steal intellectual property, disrupt the operations of websites or other systems or equipment, or deface or otherwise alter websites; can have military, political, or economic goals; and can be carried out by entities ranging from governments to corporations to hackers.