Hi everyone? Ed Amoroso here and I want to welcome you to this module. And our goal in this module is to help you learn pretty important technique in cyber security defense, which is mapping assets to threats, kind of understanding that intersection between problems that occur on the Internet, and maybe some ways that we can deal with building a defense, sort of starting to think about how we can reduce risk. And there's some papers and materials that I think would be very useful to you as we go through this module. So, first are these couple of papers that I want to point out, one is called Man-in-the-middle-attack on UMTS. UMTS is a type of wireless technology you'll learn about it the paper, written by Meyer and Wetzel. Susanne Wetzel is an old friend of mine, a colleague at the Stevens Institute of Technology. Very very cool paper about how you can in some sense eavesdrop on wireless. I think you'll enjoy it. And the second is from one of the Grand Masters in cyber security Gene Spafford, we all call him Spaf. And his paper is called, "Computer hacker break-ins ethical." That's good paper and you'll see some of Spaf's personality come out there. He's a professor at Purdue University. Now there's a couple of optional books that I think would be useful for you to consider using as you go through the module. One is an e-book that I wrote with my son Matt. It's called from CIA to APT, an introduction to cyber security. Kind of a companion e-book to the course again optional but for some of you, you might want to go on Amazon and download it because some people like to have a little book that they can read along with those lectures progress. As you go through this module, you look at the different videos that we've been covering. Now, a second book that you may consider is a TCP/IP, book and my favorite is by Richard Stevens. And you know you really ought to have a good solid TCP/IP textbook, I think on your shelf. If you want to do this for a living certainly you're going to have to know TCP/IP, in the way that a chemist knows the periodic table. So if you decide that such a book makes sense, chapter seven and eight in Steven's book would be good ones to go through as we go through this modules, so I hope you'll do that. Couple of TED talks that I think you ought to look at. One is from a former colleague of mine at AT&T, Lorrie Faith Cranor. She wrote or gave a nice talk called," What's wrong with your password?" And I think you'll enjoy Lorrie's very factious personalities, she's got a lot of enthusiasm, she's very very capable and I think you should hear her talk so that's that. And then Mikko Hyponnen from F-Secure. One of the great minds in cyber security is a video called, "Fighting viruses defending the net." I think you should take a look at it. So hopefully all of these resources will complement your learning in this module, and I hope you take advantage of all of them. So enjoy.