Hi, everyone. Ed Amoroso here and I want to welcome you to this module. Now the primary goal here will be to introduce some kind of advanced techniques in real-time security. Firewall architectures and set up in an enterprise, little bit about intrusion detection, intrusion prevention, and security operation centers. So kind of interesting collage of very practical methods that we use to stop cyber attacks once they've occurred or if we can do it right, in advance of them occurring. We can't always get that right, as you'll learn. Now there's some resources that we want you to take a look at as you go through your learning in this module. A couple of papers, they're classic ones by two people who are wonderful at this topic. One is Bill Cheswick. Some people would say he may be the inventor of the firewall. I wrote a paper called, An Evening with Burford, kind of a weird reference to an old TV show here in the United States called the Dick Van Dyke Show in the 60s. Dick Van Dyke had a brother would sleepwalk and go kind of nuts and he'd refer I've heard everybody is Burford. I have no idea why some hacker decided to call himself Burford. But Cheswick found this guy back in the 90s and wrote a funny, hilarious but, totally geeky paper about catching this person and literally putting this person into an electronic jail. It's just a classic in our industry. You should totally be reading that. And the second is a paper by, I think, without a doubt, the most famous and the most influential cybersecurity female that we have in our business, Dorothy Denning. She's such a role model for everyone, including my daughters. So she wrote a paper called IDES model, I-D-E-S and it's the foundation for how you do intrusion detection, really important paper. And there's a couple of optional books that you should look at. One is an option E-book, that you can grab it on Amazon, I wrote it with my son Matt. It's called From CIA to APT, An Introduction to Cyber Security. It's probably be around chapters 21, 22 for this module and similarly you should have a good solid TCP/IP book. It's up to you, it's optional but I think if you're going to do this for a living you need to really understand Stand TCP/IP and I think you should have a good solid book on your shelf at some point, good investment for you to make. But, TCP/IP Illustrated Volume One by Stephens chapters 21, 22 would be good to kind of complement the learning here in the module. In terms of video there's one I'd like you to look at in addition to the other resources called Death Camp 2015. It's all about building a security operation center. And it's a really good video, a lot of good practical advice in there. And I think you should take to look at it. So listen, I hope you get started and start your learning on this module immediately. And I hope you enjoy it.