[MUSIC] Congratulations, thank you for staying with me through this introductory course on Security Problems and Programming. Let's take a moment to recap all that we have covered in this course. In the first module we discussed concepts in threat modeling and cryptography. Second module we discussed issues with improperly handling user-controlled data. In the third module, we discussed issues with application authentication and session management. In the final module, we discussed issues with sensitive data exposure. Along the way, we also discussed ways of watching out for and mitigating these issues. You also had some time to try your hand at exploiting two different vulnerabilities in a web application that was designed to be vulnerable called WebGoat. You should be proud of all the work that you've done so far. As I end this course, I encourage you to continue on to the next course where you will again see my colleague Batt Bishop and be able to explore security issues in C++. I sincerely hope that this course has been instructive, useful and encouraging. I have found software security to be a dynamic field to work in as it is ever changing. This is a great time to be working in software security. Good luck in your future endeavors. [MUSIC]