 In this part I would like to describe you our STM32 security training offer. All the security ports are holder in increased difficulty levels so it's really recommended to watch them in the proposed holder. Pre-requisite and all material of each port are present in the learning page, so in the video description in fact. So our security online training offer started with security part 1, introduction to security on STM32. It should answer the following question. What is the security in embedded system? What we need to protect and why? And what is the online training offer at STM32? The second step is a security part 2, basic of cryptography. Here the purpose is to get the basic knowledge and practice main cryptography concept. So first there is some basic concept about the symmetric and asymmetric cryptography. Then you have the detail about the algorithm. And finally you've got the integrity and authentication. There is many slides of theory and also some hands on. The third step is a security part 3. Here it's STM32 security features. So it's like to have an overview about all the security block available across all STM32 lines. So you will experience them when it's possible. Here you've got a quick list about those. Next step is a security part 4. STM32 security and practice. The purpose here will be to create step by step a secure bootloader with software authentication. First we will define what is a firmware confidentiality, integrity, authenticity. Then we will create a simple secure bootloader. With trusting the secure bootloader, authenticate target application from the bootloader. And the last part will be an introduction to the secure firmware update. To complete our offer, we also have some security tips video. So short video with tips related to STM32 security. For the moment we have two videos, one about memory isolation and another one about L5 to a zone on RDP. As conclusion I will say we are ready to start our adventure. So the whole list of our online session could be in our site on STM32 education section book. You can see that there is not only the security one, but other topics. You've got all the details of each session, agenda, list of prerequisites and link to the download material. We would be happy to hear you and answer any of your questions on our community page. I hope you enjoyed this presentation and thanks for your attention.