Introduction to Hacking, Defense and Response