Hi, everyone. Ed Amoroso here, and I want to welcome you to this module. The goal in this module is kind of the intro the basic cyber defenses in the context of modeling. Creating these abstractions around how potentially you can arrange policy procedures and functionality to reduce cyber risk. A little mathematical, some of the techniques that you'll see in this module. There's some papers and videos and resources that I think you ought to consider using as you go through the module. So first off is a couple of cool papers. One is called The Hookup Theorem, and it's written by a mathematician named Daryl McCullough, it's written some number of years ago, back in 1990. But it's a tricky little interesting paper, and I'd like you to take a look at it. It'll match one of the videos in this module and help you understand it. Second is a wonderful paper by two of the masters in Unix, Morris and Thompson, about password security. I'd just like you to read it. I think you're going to just enjoy some of the, it's almost an historical survey and helps you understand where a lot of things come from in passwords and in authentication that we take for granted today. So, take a look at that paper. I think you'll enjoy it. There's a couple of optional books that you might consider. One's an e-book that I wrote with my son, Matt. It's called From CIA to APT: An Introduction to Cybersecurity. You'll want to read chapters nine and 10 as you go through the module. It's optional, but a lot of you might like to go on Amazon, download the book, and have something to follow along with. And then, another optional is a good textbook on TCP/IP. You don't need to do it, but if you want my advice, Richard Stevens, I think, wrote the best one. So TCP/IP Illustrated Vol. 1, by Stevens, is a wonderful book, and chapters nine and 10 would be good ones to take a look at as you go through this. And again, totally optional. Now, the couple of videos that I think you should look at. One, if you look, Richard Feynman, the great physicist, the Nobel Prize winning physicist, talked a little bit about testing theories. Now, he did that long before anybody even knew what cyber security was, but it's so relevant to what we do. I would like you to watch that. And then, one of the famous pioneers and maybe one of the real leaders in cyber security, Bruce Schneier, got a TED talk called The Security Mirage that you should totally watch. You want to make sure that you have some time spent watching Bruce talk. If you ever see him at a conference, make sure you go. He's fantastic. So, I hope you enjoy all the great resources we have for this module, and I hope you learn quite a bit. Thanks a lot.