[et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.9.10″ _module_preset=”default” background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” custom_margin=”||0px||false|false”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.9.10″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow|800|||||||” text_text_color=”#242424″ text_font_size=”74px” text_line_height=”1.2em” header_font=”Barlow|800|||||||” header_text_color=”#FFFFFF” header_font_size=”60px” header_2_font=”Barlow|800|||||||” header_2_font_size=”74px” text_font_size_tablet=”” text_font_size_phone=”47px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”62px” header_font_size_phone=”44px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”62px” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|desktop”]
Grow your team’s Java security skills
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.6.0″ _module_preset=”default” custom_margin=”||0px||false|false”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text content_tablet=”
As one of the most popular programming languages, we have built extensive training modules around Java security best practices. Avatao’s modules cover the most common attacks and exploits, as well as challenging exercises around Spring Framework. We guide users through three levels of competence to make sure they have a solid understanding of secure coding in Java, so that they can build secure applications.
” content_phone=”
As one of the most popular programming languages, we have built extensive training modules around Java security best practices. Avatao’s modules cover the most common attacks and exploits, as well as challenging exercises around Spring Framework. We guide users through three levels of competence to make sure they have a solid understanding of secure coding in Java, so that they can build secure applications.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”-30px||||false|false” custom_padding=”0px||||false|false”]
As one of the most popular programming languages, we have built extensive training modules around Java security best practices. Avatao’s modules cover the most common attacks and exploits, as well as challenging exercises around Spring Framework. We guide users through three levels of competence to make sure they have a solid understanding of secure coding in Java, so that they can build secure applications.
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”||-15px||false|false” custom_margin_tablet=”20px||0px||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|tablet”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”left” module_id=”demo-java-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”24px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px||0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/java-secure-coding-avatao.png” alt=”java secure coding” title_text=”java secure coding avatao” _builder_version=”4.9.10″ _module_preset=”default” width_tablet=”65%” width_phone=”” width_last_edited=”on|tablet” custom_margin_tablet=”0px||||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone” module_alignment_tablet=”center” module_alignment_phone=”” module_alignment_last_edited=”on|tablet”][/et_pb_image][/et_pb_column][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Technical Skills” _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ custom_margin=”||0px||false|false”][et_pb_row _builder_version=”4.9.10″ custom_margin=”||||false|false” custom_margin_tablet=”” custom_margin_phone=”-20px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”-30px||||false|false” locked=”off”]
Equip developers with job-relevant Java security knowledge
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.5.1″ custom_padding=”8px||5px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|600|||||||” text_text_color=”#FFFFFF” text_font_size=”24px” custom_margin=”-10px||10px||false|false” locked=”off”]
What your team will learn:
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.9.10″ custom_margin=”||||false|false”][et_pb_column type=”1_3″ _builder_version=”4.4.8″][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px”]
OWASP Top 10
API Security
Vault
Database
Session Management
Reflected File Download
Spring Framework
Insecure Deserialization
Filtering
CRLF
Atomicity
Forensics
Client Side Security
Input Validation
Backend
Authentication
Password Policy
XXE
Diagnostics
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px”]
Third-Party Components
Memory Leak
Directory Traversal
Git
Exploitation
Sensitive Data Exposure
Regular Expressions
Unrestricted File Upload
Android
IDOR
Injection
Remote Code Execution
Security Tools
SSRF
Log Analysis
Integer Overflow
Hash
CSRF
Open Redirect
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px”]
SQL Injection
Reverse Engineering
Cryptography
Buffer Overflow
Authorization
Password Cracking
Stored XSS
Asymmetric Encryption
Spring
Concurrency
Reflection
Deadlock
XSS
Defensive Command Injection
Exception Handling
Hibernate
Security Misconfiguration
OGNL Injection
Application Level DoS
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Training different levels of experise” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#2b3669″ background_enable_image=”off” custom_margin=”-10px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”||||false|false” custom_margin_last_edited=”on|phone” hover_enabled=”0″ locked=”off” sticky_enabled=”0″][et_pb_row _builder_version=”4.9.10″ custom_margin=”-30px||||false|false” custom_margin_tablet=”” custom_margin_phone=”-35px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” text_text_color=”#ffffff” header_2_font=”Barlow|800|||||||” header_2_text_color=”#ffffff” header_2_font_size=”40px” custom_margin=”||15px||false|false”]
Training for different levels of Java expertise
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.11)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”1. Beginner – Java secure coding guidelines” icon_placement=”left” content_max_width=”768px” content_tablet=”
Developers get a solid understanding of the most common Java security vulnerabilities through guided tutorials. The beginner module includes topics such as database design and transactions, authentication, data validation and password policies, as well as some basic web security topics like XSS and CSRF.
” content_phone=”
Developers get a solid understanding of the most common Java security vulnerabilities through guided tutorials. The beginner module includes topics such as database design and transactions, authentication, data validation and password policies, as well as some basic web security topics like XSS and CSRF.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-100px||false|false” custom_margin_tablet=”||-20px||false|false” custom_margin_phone=”||70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]
Developers get a solid understanding of the most common Java security vulnerabilities through guided tutorials. The beginner module includes topics such as database design and transactions, authentication, data validation and password policies, as well as some basic web security topics like XSS and CSRF.
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”2. Intermediate – Best practices and strategies” icon_placement=”left” content_max_width=”768px” content_tablet=”
Your team will gain a better understanding of the most common attack surfaces. We equip learners with hands-on skills to be able to think like hackers, and we also empower them to design and build up multiple lines of defense. Apart from diving deeper into the topics covered in the beginners’ modules, the intermediate section includes topics such as insecure direct object reference, concurrency, some security breaches and case studies, as well as secure coding topics in Java EE and Spring Framework.
” content_phone=”
Your team will gain a better understanding of the most common attack surfaces. We equip learners with hands-on skills to be able to think like hackers, and we also empower them to design and build up multiple lines of defense. Apart from diving deeper into the topics covered in the beginners’ modules, the intermediate section includes topics such as insecure direct object reference, concurrency, some security breaches and case studies, as well as secure coding topics in Java EE and Spring Framework.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-45px||false|false” custom_margin_tablet=”||55px||false|false” custom_margin_phone=”||195px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]
Your team will gain a better understanding of the most common attack surfaces. We equip learners with hands-on skills to be able to think like hackers, and we also empower them to design and build up multiple lines of defense. Apart from diving deeper into the topics covered in the beginners’ modules, the intermediate section includes topics such as insecure direct object reference, concurrency, some security breaches and case studies, as well as secure coding topics in Java EE and Spring Framework.
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”3. Advanced – Real security breaches” icon_placement=”left” content_max_width=”768px” content_tablet=”
Developers can immerse themselves in advanced Java challenges: all vulnerabilities and the relevant attacks are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines, and the possible mitigation techniques. Some of the topics included in this module are: regular expressions and related attack vectors, unrestricted file upload, reflected file download, and remote code execution challenges.
” content_phone=”
Developers can immerse themselves in advanced Java challenges: all vulnerabilities and the relevant attacks are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines, and the possible mitigation techniques. Some of the topics included in this module are: regular expressions and related attack vectors, unrestricted file upload, reflected file download, and remote code execution challenges.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-50px||false|false” custom_margin_tablet=”||-20px||false|false” custom_margin_phone=”||120px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]
Developers can immerse themselves in advanced Java challenges: all vulnerabilities and the relevant attacks are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines, and the possible mitigation techniques. Some of the topics included in this module are: regular expressions and related attack vectors, unrestricted file upload, reflected file download, and remote code execution challenges.
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row disabled_on=”off|off|off” _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”||60px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://next.avatao.com/direct?orgid=cafdc337-3c84-41d0-9406-447779b06a08&module=0eacb07f-c9b1-4452-b2f5-b7e83fa2b65e” url_new_window=”on” button_text=”Try a Java exercise” button_alignment=”center” module_id=”demo-kotlin-footer” _builder_version=”4.9.10″ custom_button=”on” button_text_size=”22px” button_text_color=”#3dffdb” button_bg_color=”RGBA(0,0,0,0)” button_border_width=”2px” button_border_color=”#3dffdb” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”-5px|25px|0px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ width=”85%” custom_margin=”0px||-20px||false|false”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”-10px||45px||false|false” locked=”off”]
Experience a Java exercise step by step
[/et_pb_text][et_pb_video src=”https://youtu.be/vvXIHMxnfbE” play_icon_color=”#ffffff” thumbnail_overlay_color=”rgba(0,0,0,0)” _builder_version=”4.9.10″ width=”65%” module_alignment=”center” custom_margin=”-10px||||false|false”][/et_pb_video][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Gained competencies ” _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” background_enable_image=”off” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_width_px__hover=”1080px” custom_width_px__hover_enabled=”1080px” custom_width_percent__hover=”80%” custom_width_percent__hover_enabled=”80%” locked=”off” gutter_width__hover=”3″ gutter_width__hover_enabled=”3″ parallax_1__hover=”off” parallax_1__hover_enabled=”off” parallax_2__hover=”off” parallax_2__hover_enabled=”off” parallax_3__hover=”off” parallax_3__hover_enabled=”off” parallax_method_1__hover=”on” parallax_method_1__hover_enabled=”on” parallax_method_2__hover=”on” parallax_method_2__hover_enabled=”on” parallax_method_3__hover=”on” parallax_method_3__hover_enabled=”on” use_background_color_gradient__hover=”off” use_background_color_gradient__hover_enabled=”off” background_color_gradient_start__hover=”#2b87da” background_color_gradient_start__hover_enabled=”#2b87da” background_color_gradient_end__hover=”#29c4a9″ background_color_gradient_end__hover_enabled=”#29c4a9″ background_color_gradient_type__hover=”linear” background_color_gradient_type__hover_enabled=”linear” background_color_gradient_direction__hover=”180deg” background_color_gradient_direction__hover_enabled=”180deg” background_color_gradient_direction_radial__hover=”center” background_color_gradient_direction_radial__hover_enabled=”center” background_color_gradient_start_position__hover=”0%” background_color_gradient_start_position__hover_enabled=”0%” background_color_gradient_end_position__hover=”100%” background_color_gradient_end_position__hover_enabled=”100%” background_color_gradient_overlays_image__hover=”off” background_color_gradient_overlays_image__hover_enabled=”off” parallax__hover=”off” parallax__hover_enabled=”off” parallax_method__hover=”on” parallax_method__hover_enabled=”on” background_size__hover=”cover” background_size__hover_enabled=”cover” background_position__hover=”center” background_position__hover_enabled=”center” background_repeat__hover=”no-repeat” background_repeat__hover_enabled=”no-repeat” background_blend__hover=”normal” background_blend__hover_enabled=”normal” allow_player_pause__hover=”off” allow_player_pause__hover_enabled=”off” background_video_pause_outside_viewport__hover=”on” background_video_pause_outside_viewport__hover_enabled=”on” inner_shadow__hover=”off” inner_shadow__hover_enabled=”off” make_fullwidth__hover=”off” make_fullwidth__hover_enabled=”off” use_custom_width__hover=”off” use_custom_width__hover_enabled=”off” width_unit__hover=”on” width_unit__hover_enabled=”on” make_equal__hover=”off” make_equal__hover_enabled=”off” use_custom_gutter__hover=”off” use_custom_gutter__hover_enabled=”off” border_radii__hover=”on||||” border_radii__hover_enabled=”on||||” box_shadow_style__hover=”none” box_shadow_style__hover_enabled=”none” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”rgba(0,0,0,0.3)” max_width__hover=”100%” max_width__hover_enabled=”100%” filter_hue_rotate__hover=”0deg” filter_hue_rotate__hover_enabled=”0deg” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”100%” filter_brightness__hover=”100%” filter_brightness__hover_enabled=”100%” filter_contrast__hover=”100%” filter_contrast__hover_enabled=”100%” filter_invert__hover=”0%” filter_invert__hover_enabled=”0%” filter_sepia__hover=”0%” filter_sepia__hover_enabled=”0%” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”100%” filter_blur__hover=”0px” filter_blur__hover_enabled=”0px” mix_blend_mode__hover=”normal” mix_blend_mode__hover_enabled=”normal” animation_style__hover=”none” animation_style__hover_enabled=”none” animation_repeat__hover=”once” animation_repeat__hover_enabled=”once” animation_direction__hover=”center” animation_direction__hover_enabled=”center” animation_duration__hover=”1000ms” animation_duration__hover_enabled=”1000ms” animation_delay__hover=”0ms” animation_delay__hover_enabled=”0ms” animation_intensity_slide__hover=”50%” animation_intensity_slide__hover_enabled=”50%” animation_intensity_zoom__hover=”50%” animation_intensity_zoom__hover_enabled=”50%” animation_intensity_flip__hover=”50%” animation_intensity_flip__hover_enabled=”50%” animation_intensity_fold__hover=”50%” animation_intensity_fold__hover_enabled=”50%” animation_intensity_roll__hover=”50%” animation_intensity_roll__hover_enabled=”50%” animation_starting_opacity__hover=”0%” animation_starting_opacity__hover_enabled=”0%” animation_speed_curve__hover=”ease-in-out” animation_speed_curve__hover_enabled=”ease-in-out” hover_transition_duration__hover=”300ms” hover_transition_duration__hover_enabled=”300ms” hover_transition_delay__hover=”0ms” hover_transition_delay__hover_enabled=”0ms” hover_transition_speed_curve__hover=”ease” hover_transition_speed_curve__hover_enabled=”ease”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-35px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”||0px||false|false” custom_margin_tablet=”||-30px||false|false” custom_margin_phone=”0px||0px||false|false” custom_margin_last_edited=”on|phone” locked=”off”]
Advantages of a Java security training
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||15px||false|false” custom_margin_tablet=”30px||||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|100px||100px|false|false” custom_padding_tablet=”” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”1_2″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”20px|30px|20px|30px|true|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|phone” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”Empower your development team to” content_max_width=”768px” content_tablet=”
- Write secure code in Java and catch application security threats early
- Learn to identify the root cause of problems and how to fix them
- Get a deep understanding of each web attack’s anatomy and objectives
- Understand both the offensive and defensive mindset
- Learn creative thinking and problem solving techniques, which help them detect innovative ways of exploiting Java security vulnerabilities
- Perform advanced source code review
- Improve development processes and strengthen your application security
” content_phone=”
- Write secure code in Java and catch application security threats early
- Learn to identify the root cause of problems and how to fix them
- Get a deep understanding of each web attack’s anatomy and objectives
- Understand both the offensive and defensive mindset
- Learn creative thinking and problem solving techniques, which help them detect innovative ways of exploiting Java security vulnerabilities
- Perform advanced source code review
- Improve development processes and strengthen your application security
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”10px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)”]
- Write secure code in Java and catch application security threats early
- Learn to identify the root cause of problems and how to fix them
- Get a deep understanding of each web attack’s anatomy and objectives
- Understand both the offensive and defensive mindset
- Learn creative thinking and problem solving techniques, which help them detect innovative ways of exploiting Java security vulnerabilities
- Perform advanced source code review
- Improve development processes and strengthen your application security
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/secure-coding-in-java-avatao.png” alt=”secure coding in java” title_text=”secure coding in java avatao” align=”center” _builder_version=”4.9.10″ _module_preset=”default” width=”50%” custom_margin=”-20px||||false|false” custom_margin_tablet=”55px||||false|false” custom_margin_phone=”40px||||false|false” custom_margin_last_edited=”on|phone”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”60px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” header_3_font=”Barlow|800|||||||” header_3_text_color=”#ffffff” header_3_font_size=”40px” custom_margin=”-10px||-5px||false|false”]
Explore Avatao’s training in other programming languages:
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/javascript-avatao-content.png” title_text=”javascript avatao content” url=”https://staging.avatao.martengartner.com/javascript-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/kotlin-avatao-content.png” title_text=”kotlin avatao content” url=”https://staging.avatao.martengartner.com/kotlin-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/c-avatao-content.png” title_text=”c avatao content” url=”https://staging.avatao.martengartner.com/c-cpp-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/csharp-avatao-content-.png” title_text=”csharp avatao content” url=”https://staging.avatao.martengartner.com/c-sharp-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-20px||-15px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/python-avatao-content.png” title_text=”python avatao content” url=”https://staging.avatao.martengartner.com/python-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/nodejs-avatao-content.png” title_text=”nodejs avatao content” url=”https://staging.avatao.martengartner.com/node-js-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/ruby-avatao-content.png” title_text=”ruby avatao content” url=”https://staging.avatao.martengartner.com/ruby-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ custom_margin_tablet=”” custom_margin_phone=”-55px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” width=”82%” max_width=”1665px” custom_margin=”-15px||-10px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_font_size=”50px” header_line_height=”1.3em” header_2_font=”|800|||||||” header_2_font_size=”50px” text_orientation=”right” background_layout=”dark” module_alignment=”right” custom_margin=”0px|0px|0px|0px|false|false” custom_padding=”0px|25px|0px|0px|false|false” header_font_size_tablet=”” header_font_size_phone=”” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|tablet” locked=”off”]
Get started with Java security training
[/et_pb_text][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|500|||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.9em” header_5_font_size=”20px” header_5_line_height=”1.3em” background_layout=”dark” width=”95.8%” custom_margin=”0px|-59px|0px|0px|false|false” custom_padding=”30px|0px|30px||false|false” locked=”off”]
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”center” module_id=”demo-java-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px||0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.10″ background_color=”#2b3669″ positioning=”none” vertical_offset=”1000px” horizontal_offset=”0px” position_origin_a_tablet=”” position_origin_a_phone=”” position_origin_a_last_edited=”on|desktop” position_origin_f_tablet=”” position_origin_f_phone=”” position_origin_f_last_edited=”on|desktop” position_origin_r_tablet=”” position_origin_r_phone=”” position_origin_r_last_edited=”on|desktop” width=”100%” min_height=”378px” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”0px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||||false|false” positioning_tablet=”” positioning_phone=”” positioning_last_edited=”on|phone” global_module=”2141″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”4.9.10″ width=”86%” max_width=”1288px” custom_margin=”30px||30px||false|false” custom_padding=”10px||0px||false|false” locked=”off”][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/avatao-logo-white.png” alt=”avatao” title_text=”avatao logo white” show_bottom_space=”off” align_tablet=”” align_phone=”center” align_last_edited=”on|phone” _builder_version=”4.9.10″ width_tablet=”65%” width_phone=”50%” width_last_edited=”on|tablet” custom_margin=”60px||0px||false|false” custom_margin_tablet=”||30px||false|false” custom_margin_phone=”||60px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false”][/et_pb_image][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” custom_margin=”20px||0px||false|false” custom_padding=”||15px||false|false” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]
Follow us
[/et_pb_text][et_pb_social_media_follow admin_label=”Social Media Follow” _builder_version=”4.6.0″ text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”][et_pb_social_media_follow_network social_network=”linkedin” url=”https://www.linkedin.com/company/avatao/” _builder_version=”4.5.1″ background_color=”#007bb6″ follow_button=”off” url_new_window=”on”]linkedin[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”twitter” url=”https://twitter.com/theavatao” _builder_version=”4.5.1″ background_color=”#00aced” follow_button=”off” url_new_window=”on”]twitter[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”facebook” url=”https://www.facebook.com/theavatao/” _builder_version=”4.5.1″ background_color=”#3b5998″ follow_button=”off” url_new_window=”on”]facebook[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”instagram” url=”https://www.instagram.com/theavatao/” _builder_version=”4.6.0″ _module_preset=”default” background_color=”#ea2c59″ follow_button=”off” url_new_window=”on”]instagram[/et_pb_social_media_follow_network][/et_pb_social_media_follow][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.8″ custom_padding=”|||10px|false|false”][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”
Secure coding training
.
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_text_color=”#FFFFFF” header_2_text_color=”#FFFFFF” header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
Secure coding training
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”
Secure coding training
Company
” content_phone=”
Resources
.
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|50px||true|false” custom_margin_tablet=”” custom_margin_phone=”90px||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
Resources
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”
Resources
About
Terms of Service & Privacy Policy
Vulnerability Disclosure Policy
” content_phone=”
Company
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”90px|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
Company
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”
About
Terms of Service & Privacy Policy
Vulnerability Disclosure Policy
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”20px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
About
Terms of Service & Privacy Policy
Vulnerability Disclosure Policy
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]
