[et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.9.10″ _module_preset=”default” background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” custom_margin=”||0px||false|false” locked=”off”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.9.10″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow|800|||||||” text_text_color=”#242424″ text_font_size=”74px” text_line_height=”1.2em” header_font=”Barlow|800|||||||” header_text_color=”#FFFFFF” header_font_size=”60px” header_2_font=”Barlow|800|||||||” header_2_font_size=”74px” text_font_size_tablet=”” text_font_size_phone=”47px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”62px” header_font_size_phone=”44px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”62px” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|desktop”]
Teach your team Ruby security best practices
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.6.0″ _module_preset=”default” custom_margin=”||0px||false|false”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text content_tablet=”
Avatao’s exercises cover topics about exploiting vulnerable web services and native applications developed with Ruby and Ruby on Rails, and provide your team with the skills needed for developing and managing secure applications. Our practical and comprehensive Ruby security training equips developers with a deep understanding of the anatomy of the most common web attacks, and prepares them for catching security threats early.
” content_phone=”
Avatao’s exercises cover topics about exploiting vulnerable web services and native applications developed with Ruby and Ruby on Rails, and provide your team with the skills needed for developing and managing secure applications. Our practical and comprehensive Ruby security training equips developers with a deep understanding of the anatomy of the most common web attacks, and prepares them for catching security threats early.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”-30px||||false|false” custom_padding=”0px||||false|false”]
Avatao’s exercises cover topics about exploiting vulnerable web services and native applications developed with Ruby and Ruby on Rails, and provide your team with the skills needed for developing and managing secure applications. Our practical and comprehensive Ruby security training equips developers with a deep understanding of the anatomy of the most common web attacks, and prepares them for catching security threats early.
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”||-15px||false|false” custom_margin_tablet=”20px||0px||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|tablet”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”left” module_id=”demo-java-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”24px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px||0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/secure-coding-in-ruby-avatao.png” alt=”secure coding in ruby” title_text=”secure coding in ruby avatao” align_tablet=”center” align_phone=”” align_last_edited=”on|tablet” _builder_version=”4.9.10″ _module_preset=”default” width_tablet=”65%” width_phone=”” width_last_edited=”on|tablet”][/et_pb_image][/et_pb_column][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Technical Skills” _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ custom_margin=”||0px||false|false” locked=”off”][et_pb_row _builder_version=”4.9.10″ custom_margin=”||||false|false” custom_margin_tablet=”” custom_margin_phone=”-20px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”-30px||||false|false” locked=”off”]
Enable your developers to build secure apps with Ruby
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.5.1″ custom_padding=”8px||5px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|600|||||||” text_text_color=”#FFFFFF” text_font_size=”24px” custom_margin=”-10px||10px||false|false” locked=”off”]
What your team will learn:
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.5.1″ custom_margin=”||||false|false”][et_pb_column type=”1_3″ _builder_version=”4.4.8″][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” hover_enabled=”0″ header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px” sticky_enabled=”0″]
OWASP Top 10
Database
Insecure Deserialization
Hijacking
CRLF
Timing Attacks
Input Validation
Authentication
Third-Party Components
Code Injection
Security Misconfiguration
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” hover_enabled=”0″ header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px” sticky_enabled=”0″]
Exploitation
Sensitive Data Exposure
Regular Expressions
Unrestricted File Upload
IDOR
Remote Code Execution
Injection
Static Analysis
Side-channel
Hash
XXE
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” hover_enabled=”0″ header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px” sticky_enabled=”0″]
Open Redirect
SQL Injection
Network Security
Authorization
Mass Assignment
Stored XSS
Secure Coding
DoS
XSS
Command Injection
Web Security
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Training different levels of experise” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#2b3669″ background_enable_image=”off” custom_margin=”-10px||-81px||false|false” custom_margin_tablet=”” custom_margin_phone=”||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_row _builder_version=”4.9.10″ custom_margin=”-30px||||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” text_text_color=”#ffffff” header_2_font=”Barlow|800|||||||” header_2_text_color=”#ffffff” header_2_font_size=”40px” custom_margin=”||15px||false|false”]
Training for different levels of Ruby security expertise
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”1. Beginner – OWASP Top 10″ icon_placement=”left” content_max_width=”768px” content_tablet=”
Developers get a solid understanding of the most common web security vulnerabilities through guided tutorials.
” content_phone=”
Developers get a solid understanding of the most common web security vulnerabilities through guided tutorials.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-150px||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]
Developers get a solid understanding of the most common web security vulnerabilities through guided tutorials.
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”2. Intermediate – Best practices and strategies” icon_placement=”left” content_max_width=”768px” content_tablet=”
Your team will gain a better understanding of the most common attack surfaces and vulnerabilities. We equip learners with hands-on skills to think like a hacker, and empower them to design and build up multiple lines of defense.
” content_phone=”
Your team will gain a better understanding of the most common attack surfaces and vulnerabilities. We equip learners with hands-on skills to think like a hacker, and empower them to design and build up multiple lines of defense.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-120px||false|false” custom_margin_tablet=”||-50px||false|false” custom_margin_phone=”||20px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]
Your team will gain a better understanding of the most common attack surfaces and vulnerabilities. We equip learners with hands-on skills to think like a hacker, and empower them to design and build up multiple lines of defense.
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”3. Advanced – Advanced topics of security” icon_placement=”left” content_max_width=”768px” content_tablet=”
Security tutorials allow developers to immerse themselves in advanced topics related to native Ruby and Rails vulnerabilities and attacks. These are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines and possible mitigation techniques.
” content_phone=”
Security tutorials allow developers to immerse themselves in advanced topics related to native Ruby and Rails vulnerabilities and attacks. These are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines and possible mitigation techniques.
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”220px” height=”297px” custom_margin=”0px||-130px||false|false” custom_margin_tablet=”||-60px||false|false” custom_margin_phone=”||20px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]
Security tutorials allow developers to immerse themselves in advanced topics related to native Ruby and Rails vulnerabilities and attacks. These are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines and possible mitigation techniques.
[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.6.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://next.avatao.com/direct?orgid=cafdc337-3c84-41d0-9406-447779b06a08&module=ce607142-0f79-4e2f-ad18-3949a0f21481″ url_new_window=”on” button_text=”Try a Ruby exercise” button_alignment=”center” module_id=”demo-kotlin-footer” _builder_version=”4.9.10″ custom_button=”on” button_text_size=”22px” button_text_color=”#3dffdb” button_bg_color=”RGBA(0,0,0,0)” button_border_width=”2px” button_border_color=”#3dffdb” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”-10px|25px|60px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Gained competencies ” _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” background_enable_image=”off” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_width_px__hover=”1080px” custom_width_px__hover_enabled=”1080px” custom_width_percent__hover=”80%” custom_width_percent__hover_enabled=”80%” locked=”off” gutter_width__hover=”3″ gutter_width__hover_enabled=”3″ parallax_1__hover=”off” parallax_1__hover_enabled=”off” parallax_2__hover=”off” parallax_2__hover_enabled=”off” parallax_3__hover=”off” parallax_3__hover_enabled=”off” parallax_method_1__hover=”on” parallax_method_1__hover_enabled=”on” parallax_method_2__hover=”on” parallax_method_2__hover_enabled=”on” parallax_method_3__hover=”on” parallax_method_3__hover_enabled=”on” use_background_color_gradient__hover=”off” use_background_color_gradient__hover_enabled=”off” background_color_gradient_start__hover=”#2b87da” background_color_gradient_start__hover_enabled=”#2b87da” background_color_gradient_end__hover=”#29c4a9″ background_color_gradient_end__hover_enabled=”#29c4a9″ background_color_gradient_type__hover=”linear” background_color_gradient_type__hover_enabled=”linear” background_color_gradient_direction__hover=”180deg” background_color_gradient_direction__hover_enabled=”180deg” background_color_gradient_direction_radial__hover=”center” background_color_gradient_direction_radial__hover_enabled=”center” background_color_gradient_start_position__hover=”0%” background_color_gradient_start_position__hover_enabled=”0%” background_color_gradient_end_position__hover=”100%” background_color_gradient_end_position__hover_enabled=”100%” background_color_gradient_overlays_image__hover=”off” background_color_gradient_overlays_image__hover_enabled=”off” parallax__hover=”off” parallax__hover_enabled=”off” parallax_method__hover=”on” parallax_method__hover_enabled=”on” background_size__hover=”cover” background_size__hover_enabled=”cover” background_position__hover=”center” background_position__hover_enabled=”center” background_repeat__hover=”no-repeat” background_repeat__hover_enabled=”no-repeat” background_blend__hover=”normal” background_blend__hover_enabled=”normal” allow_player_pause__hover=”off” allow_player_pause__hover_enabled=”off” background_video_pause_outside_viewport__hover=”on” background_video_pause_outside_viewport__hover_enabled=”on” inner_shadow__hover=”off” inner_shadow__hover_enabled=”off” make_fullwidth__hover=”off” make_fullwidth__hover_enabled=”off” use_custom_width__hover=”off” use_custom_width__hover_enabled=”off” width_unit__hover=”on” width_unit__hover_enabled=”on” make_equal__hover=”off” make_equal__hover_enabled=”off” use_custom_gutter__hover=”off” use_custom_gutter__hover_enabled=”off” border_radii__hover=”on||||” border_radii__hover_enabled=”on||||” box_shadow_style__hover=”none” box_shadow_style__hover_enabled=”none” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”rgba(0,0,0,0.3)” max_width__hover=”100%” max_width__hover_enabled=”100%” filter_hue_rotate__hover=”0deg” filter_hue_rotate__hover_enabled=”0deg” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”100%” filter_brightness__hover=”100%” filter_brightness__hover_enabled=”100%” filter_contrast__hover=”100%” filter_contrast__hover_enabled=”100%” filter_invert__hover=”0%” filter_invert__hover_enabled=”0%” filter_sepia__hover=”0%” filter_sepia__hover_enabled=”0%” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”100%” filter_blur__hover=”0px” filter_blur__hover_enabled=”0px” mix_blend_mode__hover=”normal” mix_blend_mode__hover_enabled=”normal” animation_style__hover=”none” animation_style__hover_enabled=”none” animation_repeat__hover=”once” animation_repeat__hover_enabled=”once” animation_direction__hover=”center” animation_direction__hover_enabled=”center” animation_duration__hover=”1000ms” animation_duration__hover_enabled=”1000ms” animation_delay__hover=”0ms” animation_delay__hover_enabled=”0ms” animation_intensity_slide__hover=”50%” animation_intensity_slide__hover_enabled=”50%” animation_intensity_zoom__hover=”50%” animation_intensity_zoom__hover_enabled=”50%” animation_intensity_flip__hover=”50%” animation_intensity_flip__hover_enabled=”50%” animation_intensity_fold__hover=”50%” animation_intensity_fold__hover_enabled=”50%” animation_intensity_roll__hover=”50%” animation_intensity_roll__hover_enabled=”50%” animation_starting_opacity__hover=”0%” animation_starting_opacity__hover_enabled=”0%” animation_speed_curve__hover=”ease-in-out” animation_speed_curve__hover_enabled=”ease-in-out” hover_transition_duration__hover=”300ms” hover_transition_duration__hover_enabled=”300ms” hover_transition_delay__hover=”0ms” hover_transition_delay__hover_enabled=”0ms” hover_transition_speed_curve__hover=”ease” hover_transition_speed_curve__hover_enabled=”ease”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-35px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”||0px||false|false” custom_margin_tablet=”||-30px||false|false” custom_margin_phone=”0px||0px||false|false” custom_margin_last_edited=”on|phone” locked=”off”]
Advantages of a Ruby security training
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||15px||false|false” custom_margin_tablet=”30px||||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|100px||100px|false|false” custom_padding_tablet=”” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”1_2″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”20px|30px|20px|30px|true|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|phone” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”Empower your development team to” content_max_width=”768px” content_tablet=”
- Write secure code in Ruby and catch application security threats early
- Learn to identify the root cause of problems and how to fix them
- Get a deep understanding of each web attack’s anatomy and objectives
- Understand both the offensive and defensive mindset
- Learn techniques and strategies for creative thinking and problem solving, to detect innovative ways of exploiting Ruby and related frameworks’ security vulnerabilities
” content_phone=”
- Write secure code in Ruby and catch application security threats early
- Learn to identify the root cause of problems and how to fix them
- Get a deep understanding of each web attack’s anatomy and objectives
- Understand both the offensive and defensive mindset
- Learn techniques and strategies for creative thinking and problem solving, to detect innovative ways of exploiting Ruby and related frameworks’ security vulnerabilities
” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”10px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)”]
- Write secure code in Ruby and catch application security threats early
- Learn to identify the root cause of problems and how to fix them
- Get a deep understanding of each web attack’s anatomy and objectives
- Understand both the offensive and defensive mindset
- Learn techniques and strategies for creative thinking and problem solving, to detect innovative ways of exploiting Ruby and related frameworks’ security vulnerabilities
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.10″ background_enable_color=”off” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/ruby-security-training-avatao.png” alt=”ruby security training” title_text=”ruby security training avatao” align=”center” _builder_version=”4.9.10″ _module_preset=”default” width=”50%” width_tablet=”” width_phone=”” width_last_edited=”on|tablet” max_width=”100%” module_alignment=”center” custom_margin=”0px||0px||false|false”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”60px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” header_3_font=”Barlow|800|||||||” header_3_text_color=”#ffffff” header_3_font_size=”40px” custom_margin=”-10px||-5px||false|false”]
Explore Avatao’s training in other programming languages:
[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/java-avatao-content.png” title_text=”java avatao content” url=”https://staging.avatao.martengartner.com/java-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/javascript-avatao-content.png” title_text=”javascript avatao content” url=”https://staging.avatao.martengartner.com/javascript-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/kotlin-avatao-content.png” title_text=”kotlin avatao content” url=”https://staging.avatao.martengartner.com/kotlin-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/c-avatao-content.png” title_text=”c avatao content” url=”https://staging.avatao.martengartner.com/c-cpp-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-20px||-15px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/csharp-avatao-content-.png” title_text=”csharp avatao content” url=”https://staging.avatao.martengartner.com/c-sharp-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/python-avatao-content.png” title_text=”python avatao content” url=”https://staging.avatao.martengartner.com/python-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/nodejs-avatao-content.png” title_text=”nodejs avatao content” url=”https://staging.avatao.martengartner.com/node-js-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ custom_margin_tablet=”” custom_margin_phone=”-55px||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” width=”82%” max_width=”1665px” custom_margin=”-15px||-10px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_font_size=”50px” header_line_height=”1.3em” header_2_font=”|800|||||||” header_2_font_size=”50px” text_orientation=”right” background_layout=”dark” module_alignment=”right” custom_margin=”0px|0px|0px|0px|false|false” custom_padding=”0px|25px|0px|0px|false|false” header_font_size_tablet=”” header_font_size_phone=”” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|tablet” locked=”off”]
Get started with Ruby security training
[/et_pb_text][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|500|||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.9em” header_5_font_size=”20px” header_5_line_height=”1.3em” background_layout=”dark” width=”95.8%” custom_margin=”0px|-59px|0px|0px|false|false” custom_padding=”30px|0px|30px||false|false” hover_enabled=”0″ locked=”off” sticky_enabled=”0″]
[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”center” module_id=”demo-java-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px||0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.10″ background_color=”#2b3669″ positioning=”none” vertical_offset=”1000px” horizontal_offset=”0px” position_origin_a_tablet=”” position_origin_a_phone=”” position_origin_a_last_edited=”on|desktop” position_origin_f_tablet=”” position_origin_f_phone=”” position_origin_f_last_edited=”on|desktop” position_origin_r_tablet=”” position_origin_r_phone=”” position_origin_r_last_edited=”on|desktop” width=”100%” min_height=”378px” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”0px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||||false|false” positioning_tablet=”” positioning_phone=”” positioning_last_edited=”on|phone” global_module=”2141″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”4.9.10″ width=”86%” max_width=”1288px” custom_margin=”30px||30px||false|false” custom_padding=”10px||0px||false|false” locked=”off”][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/avatao-logo-white.png” alt=”avatao” title_text=”avatao logo white” show_bottom_space=”off” align_tablet=”” align_phone=”center” align_last_edited=”on|phone” _builder_version=”4.9.10″ width_tablet=”65%” width_phone=”50%” width_last_edited=”on|tablet” custom_margin=”60px||0px||false|false” custom_margin_tablet=”||30px||false|false” custom_margin_phone=”||60px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false”][/et_pb_image][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” custom_margin=”20px||0px||false|false” custom_padding=”||15px||false|false” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]
Follow us
[/et_pb_text][et_pb_social_media_follow admin_label=”Social Media Follow” _builder_version=”4.6.0″ text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”][et_pb_social_media_follow_network social_network=”linkedin” url=”https://www.linkedin.com/company/avatao/” _builder_version=”4.5.1″ background_color=”#007bb6″ follow_button=”off” url_new_window=”on”]linkedin[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”twitter” url=”https://twitter.com/theavatao” _builder_version=”4.5.1″ background_color=”#00aced” follow_button=”off” url_new_window=”on”]twitter[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”facebook” url=”https://www.facebook.com/theavatao/” _builder_version=”4.5.1″ background_color=”#3b5998″ follow_button=”off” url_new_window=”on”]facebook[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”instagram” url=”https://www.instagram.com/theavatao/” _builder_version=”4.6.0″ _module_preset=”default” background_color=”#ea2c59″ follow_button=”off” url_new_window=”on”]instagram[/et_pb_social_media_follow_network][/et_pb_social_media_follow][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.8″ custom_padding=”|||10px|false|false”][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”
Secure coding training
.
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_text_color=”#FFFFFF” header_2_text_color=”#FFFFFF” header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
Secure coding training
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”
Secure coding training
Company
” content_phone=”
Resources
.
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|50px||true|false” custom_margin_tablet=”” custom_margin_phone=”90px||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
Resources
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”
Resources
About
Terms of Service & Privacy Policy
Vulnerability Disclosure Policy
” content_phone=”
Company
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”90px|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
Company
[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”
About
Terms of Service & Privacy Policy
Vulnerability Disclosure Policy
” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”20px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]
About
Terms of Service & Privacy Policy
Vulnerability Disclosure Policy
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]
