Congratulations. Thank you for staying with me through this course on exploiting and securing vulnerabilities in Java apps. I hope you've gained the confidence you'll need to keep learning and working through other lessons in WebGo. Let's recap what we covered in this course. In the first module, we covered cross site scripting or XSS attacks and why it's important to protect against these kinds of attacks. In the second module, we explored injection attacks. We've covered XXE and SQL injection. In the third module, we focused on authentication bypass. What it is, how it works, and why it's important. In the final module, we dealt with finding vulnerable components in the code and looked at why it's vital to secure our application against these vulnerabilities. This is what I think you will need to start your application security testing career. Black hat hackers have a lot of resources and are constantly finding flaws. Our job as white hats is never finished, but that's what's exciting. You should be proud of all the work you've done this far. As I end this course, I encourage you to continue to keep ongoing, do the lessons in WebGo, and stay up to date with OWASP and the apps site community. This may be the end of this course, but it's just a startup of your ongoing education in this exciting field. If you see me at a conference, come say hi. I hope that this course has given you the confidence to get started. There's so much more to learn, so have fun.