Welcome to module six. Great job getting through the Cloud Identity course. Let's tie it all together now and wrap up the course by covering some real-life use cases and scenarios. In this module, we'll be reviewing what you learned during this course, cover some common Cloud Identity use cases, and provide you with some resources to use as you begin fashioning your identity, access management, and mobile management solution. By the end of this module, you'll be able to summarize what you've learned from this Cloud Identity course, you'll be able to describe some common Cloud Identity use cases and scenarios. In the first module, we introduced you to cloud identity, and we discussed why having a cloud-based identity as a service solution is beneficial to your organization. Cloud Identity allows you to not only create and manage your users, but it has a robust set of security features that will help keep your organization's data safe. We also covered domains, which allows people and services to directly communicate and work with you and your organization. You can use your domain along with Cloud Identity to design and implement your organization's identity and access management approach. In module two, we went through Cloud Identities, user lifecycle management feature set. Managing your users is one of the most important tasks associated with being an identity and access management admin. Nothing can happen without your users. You created a user set, established different roles for some users, and delegated responsibilities. You're also now aware of different tools Google offers you, like Google Cloud Directory Sync, which will help you when considering option of automatically moving large user sets and associated data to your domain. When it comes to security, we spent a lot of time familiarizing with some of the best practices and tools that your organization should consider when developing your security policies. We walked you through and talked about examining your user's password strength and ensuring that the two-step verification was enabled. You learned about SSO policies, and the different options you can enable to ensure smooth user sign in across your organization's cloud applications. We've delved into establishing access control policies to ensure that your organization and users are protected against unsecure applications. You also learned about enabling API security features. After walking through some of the security best practices, you then moved into learning about Google Mobile Management. Mobile management allows you to manage your organization's data and ensure your organization's security. You learned how to add mobile devices and turn on advance management. You also explored different mobile device policies. You learned where and how to enforce device screen locks and pass codes, wipe corporate data, and also view and search for device details. Moving on to domain management module, we covered how to create domain aliases and add extra domains. You also learned about whitelisting domains and ensuring your domain security. Lastly, let’s highlight the reporting module topics that we've covered. You learned to take advantage of reports to monitor your organization, including highlighted reports, aggregate reports, security reports, and account activity reports. You explored audit logs, which allows you to also monitor your organization. Finally, you created administrator email alerts so that you can be notified if something important or suspicious happen in your organization. Congratulations, you just completed your introduction to Cloud Identity course. We hope that you can use what you've learned from this course to apply to your organization as a Cloud Identity system administrator. Immediately following this module, you'll be presented with popular Cloud Identity business use cases. We will walk you through a guided reading that will present you with the business problem, and how cloud identity provides solutions. Please take time to read through these. Also, take advantage of these course resources at the end of the module to further help solidify what you have learned. We wish you the best in managing your organization's cloud resources and services with Cloud Identity. And we hope this course has been useful for you.