Hi everyone, I'm Ed Amoroso and I want to welcome you to our course on introduction to cyber defense. I think this is going to be very interesting and useful for you. In cyber security, my personal opinion is that there's way too much emphasis on cyber offence, like hacking, breaking into things. I know how fun that can be. I know how challenging that can be. But there's some pretty foundational issues that need to be covered, need to be understood in order to really defend or stop these types of things. That's where we're going to be spending time on it in this course. It's an introduction to cyber defense, with an emphasis on controls. We'll be doing a lot of cryptography. You'll be seeing the proverbial Alice and Bob communicating and sending messages back and forth by the end of this course. You'll probably be tired of hearing about Alice and Bob. But you're going to learn quite a bit. So really the three main goals here that we have for this course. The first to introduce the most important functional measures. You'll see in a minute the safe guards have a little bit to do with policy, procedure, and so on. We'll do that in a subsequent video. But really it's the functional mechanisms that lay the ground work for the computer security, the cyber security, the computer science aspects of what we're doing. So, that's our first goal. The second is to lay out practical applications here. So, we really do focus on this being a practicum. We want this to be something that can be applied. This is not about building a theoretical basis, even though, I am going to spend some time building the theoretical foundations. I think you need that, but it's always about coming back to the real practical applications. So that's our second. And then third, I want to try and inspire you to a career in cyber defense. Again, [LAUGH] too many hackers and not enough defenders. So, hopefully by the end of this course you're going to be inspired and you're going to want to go really into a career as a good guy or a good girl, stopping attacks rather than designing new ones. And I'm joking, I understand that we do have to understand how the hacks work. And in a previous course, we spent some time on that. But, I hope you'll stick with us through the lectures here, through the videos, read all of the materials. I think you're going to learn quite a bit, so welcome to our course here on introduction to cyber defense. Thanks.