Hi everyone, Ed Amoroso here, and what I'd like to do in this video is I want to kind of wrap up this course, this topic of real time cyber security. If you've been with us, we started by looking at firewalls and packet filtering and how you arrange them and do IPS and all kinds of real time things. Looked at SYNs, we looked at Socks, we had a lot of fun with that, very interesting stuff. But if you're wondering, what's the full range of controls that need to be done to kind of protect a typical enterprise? Well, that's a tough question, this is a really complex and very full topic. We probably would need 1,000 videos to really dig into all of these things properly. But one of the things I worked on personally that you can download, we're going to pop up the URL, it's tag-cyber.com. You can download a free PDF. It's three volumes that we've downloaded and created. You'll see the information. But one of the graphics in my reports is the graphic that I'm showing here on the screen. It shows basically six columns of categories of different types of controls. And under each one, I sort of label out the control category that I think needs to be attended to from a cyber security perspective, if you're protecting infrastructure. And you can see intrusion detection prevention, you can see firewall, you can see a lot of the things that are probably very familiar to you. There may be a couple in there that you're less familiar with, like unified threat management as a category. We didn't have a lot of time for as we went through our discussion of real time cyber security. It's basically combining a lot of different security controls into one appliance or device that a small company would use. But you may want to take a little time if you feel like you really want to do more research and dig in and get a better general sense of all the different controls that are here. You may want to take a look at this graphic, you might want to think about downloading the PDF. It might just give you something, a frame of reference as you plan a life time of learning in this area. You can sort of number them, there's 50 different areas that I've identified. And I think in each of them, you can spend some time making sure that you get yourself comfortable. It's kind of a self-learning sort of thing that you can do outside the confines of your learning in this course. But if you're really, really motivated, and you say I want to become an expert, then grabbing this this diagram and going through the different components that are in here might be very useful to you. So I hope you've enjoyed this discussion of real time cyber security. I hope it's really helped you, and I've enjoyed my time with you here as we've gone through real time cyber security, thanks.