[MUSIC] Hello everyone, many of us use social media web applications such as Twitter, Facebook, and Instagram. We also use banking web applications on a regular basis to check our bank information like credit cards, account status and mortgage information. We risk our personal data every day by using these web applications. And so, software security has become a very critical part of our lives. Also, a software developer who has a fundamental understanding of software security can have an advantage in the workplace. When we study software security, we want to keep in mind the fundamental ideas of confidentiality, integrity, and availability. We also want to be aware of the idea that individual software security concepts can be thought of as conceptual building blocks for understanding other aspects of software development. In this module, you will gain exposure to the ideas of threat modeling and applied cryptography. By the end of the module, you will be able to start to create threat models, and think critically about the threat models created by other people. You will be able to apply the STRIDE Method to your threat model and distinguish the trust boundaries in a given system. You will also gain a basic understanding of applied cryptography such as encryption and secure hashing. We have a lot to cover, so let's get started.