[et_pb_section fb_built=”1″ specialty=”on” _builder_version=”4.9.10″ _module_preset=”default” background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” custom_margin=”||0px||false|false” locked=”off”][et_pb_column type=”3_4″ specialty_columns=”3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_row_inner _builder_version=”4.9.10″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow|800|||||||” text_text_color=”#242424″ text_font_size=”74px” text_line_height=”1.2em” header_font=”Barlow|800|||||||” header_text_color=”#FFFFFF” header_font_size=”60px” header_2_font=”Barlow|800|||||||” header_2_font_size=”74px” text_font_size_tablet=”” text_font_size_phone=”47px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”62px” header_font_size_phone=”44px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”62px” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|desktop”]

Teach your team Ruby security best practices

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.6.0″ _module_preset=”default” custom_margin=”||0px||false|false”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text content_tablet=”

Avatao’s exercises cover topics about exploiting vulnerable web services and native applications developed with Ruby and Ruby on Rails, and provide your team with the skills needed for developing and managing secure applications. Our practical and comprehensive Ruby security training equips developers with a deep understanding of the anatomy of the most common web attacks, and prepares them for catching security threats early.

” content_phone=”

Avatao’s exercises cover topics about exploiting vulnerable web services and native applications developed with Ruby and Ruby on Rails, and provide your team with the skills needed for developing and managing secure applications. Our practical and comprehensive Ruby security training equips developers with a deep understanding of the anatomy of the most common web attacks, and prepares them for catching security threats early.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”-30px||||false|false” custom_padding=”0px||||false|false”]

Avatao’s exercises cover topics about exploiting vulnerable web services and native applications developed with Ruby and Ruby on Rails, and provide your team with the skills needed for developing and managing secure applications. Our practical and comprehensive Ruby security training equips developers with a deep understanding of the anatomy of the most common web attacks, and prepares them for catching security threats early.

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”||-15px||false|false” custom_margin_tablet=”20px||0px||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|tablet”][et_pb_column_inner saved_specialty_column_type=”3_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”left” module_id=”demo-java-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”24px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px||0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/secure-coding-in-ruby-avatao.png” alt=”secure coding in ruby” title_text=”secure coding in ruby avatao” align_tablet=”center” align_phone=”” align_last_edited=”on|tablet” _builder_version=”4.9.10″ _module_preset=”default” width_tablet=”65%” width_phone=”” width_last_edited=”on|tablet”][/et_pb_image][/et_pb_column][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Technical Skills” _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ custom_margin=”||0px||false|false” locked=”off”][et_pb_row _builder_version=”4.9.10″ custom_margin=”||||false|false” custom_margin_tablet=”” custom_margin_phone=”-20px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”-30px||||false|false” locked=”off”]

Enable your developers to build secure apps with Ruby

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.5.1″ custom_padding=”8px||5px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|600|||||||” text_text_color=”#FFFFFF” text_font_size=”24px” custom_margin=”-10px||10px||false|false” locked=”off”]

What your team will learn:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”4.5.1″ custom_margin=”||||false|false”][et_pb_column type=”1_3″ _builder_version=”4.4.8″][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” hover_enabled=”0″ header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px” sticky_enabled=”0″]

OWASP Top 10

Database

Insecure Deserialization

Hijacking

CRLF

Timing Attacks

Input Validation

Authentication

Third-Party Components

Code Injection

Security Misconfiguration

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” hover_enabled=”0″ header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px” sticky_enabled=”0″]

Exploitation

Sensitive Data Exposure

Regular Expressions

Unrestricted File Upload

IDOR

Remote Code Execution

Injection

Static Analysis

Side-channel

Hash

XXE

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”center” header_text_color=”#2a3749″ header_font_size=”20px” header_line_height=”1.3em” body_font=”Barlow|600|||||||” body_text_align=”justify” body_text_color=”#2a3749″ body_line_height=”1em” background_color=”rgba(43,54,105,0.3)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” text_orientation=”center” background_layout=”dark” module_alignment=”center” min_height=”140px” custom_margin=”3px||30px||false|false” custom_margin_tablet=”” custom_margin_phone=”||1px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”40px|1px|40px|0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” hover_enabled=”0″ header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_spread=”-5px” sticky_enabled=”0″]

Open Redirect

SQL Injection

Network Security

Authorization

Mass Assignment

Stored XSS

Secure Coding

DoS

XSS

Command Injection

Web Security

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Training different levels of experise” _builder_version=”4.9.10″ _module_preset=”default” background_color=”#2b3669″ background_enable_image=”off” custom_margin=”-10px||-81px||false|false” custom_margin_tablet=”” custom_margin_phone=”||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_row _builder_version=”4.9.10″ custom_margin=”-30px||||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone”][et_pb_column type=”4_4″ _builder_version=”4.4.8″][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” text_text_color=”#ffffff” header_2_font=”Barlow|800|||||||” header_2_text_color=”#ffffff” header_2_font_size=”40px” custom_margin=”||15px||false|false”]

Training for different levels of Ruby security expertise

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”1. Beginner – OWASP Top 10″ icon_placement=”left” content_max_width=”768px” content_tablet=”

Developers get a solid understanding of the most common web security vulnerabilities through guided tutorials.

” content_phone=”

Developers get a solid understanding of the most common web security vulnerabilities through guided tutorials.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-150px||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]

Developers get a solid understanding of the most common web security vulnerabilities through guided tutorials.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”2. Intermediate – Best practices and strategies” icon_placement=”left” content_max_width=”768px” content_tablet=”

Your team will gain a better understanding of the most common attack surfaces and vulnerabilities. We equip learners with hands-on skills to think like a hacker, and empower them to design and build up multiple lines of defense.

” content_phone=”

Your team will gain a better understanding of the most common attack surfaces and vulnerabilities. We equip learners with hands-on skills to think like a hacker, and empower them to design and build up multiple lines of defense.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” height=”261px” custom_margin=”0px||-120px||false|false” custom_margin_tablet=”||-50px||false|false” custom_margin_phone=”||20px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]

Your team will gain a better understanding of the most common attack surfaces and vulnerabilities. We equip learners with hands-on skills to think like a hacker, and empower them to design and build up multiple lines of defense.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” custom_margin=”||35px||false|false” border_radii=”off|30px|30px|30px|30px” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default” custom_padding=”|||0px|false|false” border_radii=”on|30px|30px|30px|30px” border_width_all=”15px” border_color_all=”rgba(0,0,0,0)”][et_pb_blurb title=”3. Advanced – Advanced topics of security” icon_placement=”left” content_max_width=”768px” content_tablet=”

Security tutorials allow developers to immerse themselves in advanced topics related to native Ruby and Rails vulnerabilities and attacks. These are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines and possible mitigation techniques.

” content_phone=”

Security tutorials allow developers to immerse themselves in advanced topics related to native Ruby and Rails vulnerabilities and attacks. These are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines and possible mitigation techniques.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h2″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”33px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”220px” height=”297px” custom_margin=”0px||-130px||false|false” custom_margin_tablet=”||-60px||false|false” custom_margin_phone=”||20px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|1px||0px|false|false” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]

Security tutorials allow developers to immerse themselves in advanced topics related to native Ruby and Rails vulnerabilities and attacks. These are demonstrated through real-life security breaches, followed by the recommended secure coding guidelines and possible mitigation techniques.

 

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.6.0″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_button button_url=”https://next.avatao.com/direct?orgid=cafdc337-3c84-41d0-9406-447779b06a08&module=ce607142-0f79-4e2f-ad18-3949a0f21481″ url_new_window=”on” button_text=”Try a Ruby exercise” button_alignment=”center” module_id=”demo-kotlin-footer” _builder_version=”4.9.10″ custom_button=”on” button_text_size=”22px” button_text_color=”#3dffdb” button_bg_color=”RGBA(0,0,0,0)” button_border_width=”2px” button_border_color=”#3dffdb” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”-10px|25px|60px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Gained competencies ” _builder_version=”4.9.10″ background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” background_enable_image=”off” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_width_px__hover=”1080px” custom_width_px__hover_enabled=”1080px” custom_width_percent__hover=”80%” custom_width_percent__hover_enabled=”80%” locked=”off” gutter_width__hover=”3″ gutter_width__hover_enabled=”3″ parallax_1__hover=”off” parallax_1__hover_enabled=”off” parallax_2__hover=”off” parallax_2__hover_enabled=”off” parallax_3__hover=”off” parallax_3__hover_enabled=”off” parallax_method_1__hover=”on” parallax_method_1__hover_enabled=”on” parallax_method_2__hover=”on” parallax_method_2__hover_enabled=”on” parallax_method_3__hover=”on” parallax_method_3__hover_enabled=”on” use_background_color_gradient__hover=”off” use_background_color_gradient__hover_enabled=”off” background_color_gradient_start__hover=”#2b87da” background_color_gradient_start__hover_enabled=”#2b87da” background_color_gradient_end__hover=”#29c4a9″ background_color_gradient_end__hover_enabled=”#29c4a9″ background_color_gradient_type__hover=”linear” background_color_gradient_type__hover_enabled=”linear” background_color_gradient_direction__hover=”180deg” background_color_gradient_direction__hover_enabled=”180deg” background_color_gradient_direction_radial__hover=”center” background_color_gradient_direction_radial__hover_enabled=”center” background_color_gradient_start_position__hover=”0%” background_color_gradient_start_position__hover_enabled=”0%” background_color_gradient_end_position__hover=”100%” background_color_gradient_end_position__hover_enabled=”100%” background_color_gradient_overlays_image__hover=”off” background_color_gradient_overlays_image__hover_enabled=”off” parallax__hover=”off” parallax__hover_enabled=”off” parallax_method__hover=”on” parallax_method__hover_enabled=”on” background_size__hover=”cover” background_size__hover_enabled=”cover” background_position__hover=”center” background_position__hover_enabled=”center” background_repeat__hover=”no-repeat” background_repeat__hover_enabled=”no-repeat” background_blend__hover=”normal” background_blend__hover_enabled=”normal” allow_player_pause__hover=”off” allow_player_pause__hover_enabled=”off” background_video_pause_outside_viewport__hover=”on” background_video_pause_outside_viewport__hover_enabled=”on” inner_shadow__hover=”off” inner_shadow__hover_enabled=”off” make_fullwidth__hover=”off” make_fullwidth__hover_enabled=”off” use_custom_width__hover=”off” use_custom_width__hover_enabled=”off” width_unit__hover=”on” width_unit__hover_enabled=”on” make_equal__hover=”off” make_equal__hover_enabled=”off” use_custom_gutter__hover=”off” use_custom_gutter__hover_enabled=”off” border_radii__hover=”on||||” border_radii__hover_enabled=”on||||” box_shadow_style__hover=”none” box_shadow_style__hover_enabled=”none” box_shadow_color__hover=”rgba(0,0,0,0.3)” box_shadow_color__hover_enabled=”rgba(0,0,0,0.3)” max_width__hover=”100%” max_width__hover_enabled=”100%” filter_hue_rotate__hover=”0deg” filter_hue_rotate__hover_enabled=”0deg” filter_saturate__hover=”100%” filter_saturate__hover_enabled=”100%” filter_brightness__hover=”100%” filter_brightness__hover_enabled=”100%” filter_contrast__hover=”100%” filter_contrast__hover_enabled=”100%” filter_invert__hover=”0%” filter_invert__hover_enabled=”0%” filter_sepia__hover=”0%” filter_sepia__hover_enabled=”0%” filter_opacity__hover=”100%” filter_opacity__hover_enabled=”100%” filter_blur__hover=”0px” filter_blur__hover_enabled=”0px” mix_blend_mode__hover=”normal” mix_blend_mode__hover_enabled=”normal” animation_style__hover=”none” animation_style__hover_enabled=”none” animation_repeat__hover=”once” animation_repeat__hover_enabled=”once” animation_direction__hover=”center” animation_direction__hover_enabled=”center” animation_duration__hover=”1000ms” animation_duration__hover_enabled=”1000ms” animation_delay__hover=”0ms” animation_delay__hover_enabled=”0ms” animation_intensity_slide__hover=”50%” animation_intensity_slide__hover_enabled=”50%” animation_intensity_zoom__hover=”50%” animation_intensity_zoom__hover_enabled=”50%” animation_intensity_flip__hover=”50%” animation_intensity_flip__hover_enabled=”50%” animation_intensity_fold__hover=”50%” animation_intensity_fold__hover_enabled=”50%” animation_intensity_roll__hover=”50%” animation_intensity_roll__hover_enabled=”50%” animation_starting_opacity__hover=”0%” animation_starting_opacity__hover_enabled=”0%” animation_speed_curve__hover=”ease-in-out” animation_speed_curve__hover_enabled=”ease-in-out” hover_transition_duration__hover=”300ms” hover_transition_duration__hover_enabled=”300ms” hover_transition_delay__hover=”0ms” hover_transition_delay__hover_enabled=”0ms” hover_transition_speed_curve__hover=”ease” hover_transition_speed_curve__hover_enabled=”ease”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-35px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”||0px||false|false” custom_margin_tablet=”||-30px||false|false” custom_margin_phone=”0px||0px||false|false” custom_margin_last_edited=”on|phone” locked=”off”]

Advantages of a Ruby security training

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||15px||false|false” custom_margin_tablet=”30px||||false|false” custom_margin_phone=”0px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|100px||100px|false|false” custom_padding_tablet=”” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”1_2″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”20px|30px|20px|30px|true|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|phone” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”Empower your development team to” content_max_width=”768px” content_tablet=”

  • Write secure code in Ruby and catch application security threats early
  • Learn to identify the root cause of problems and how to fix them
  • Get a deep understanding of each web attack’s anatomy and objectives
  • Understand both the offensive and defensive mindset
  • Learn techniques and strategies for creative thinking and problem solving, to detect innovative ways of exploiting Ruby and related frameworks’ security vulnerabilities

” content_phone=”

  • Write secure code in Ruby and catch application security threats early
  • Learn to identify the root cause of problems and how to fix them
  • Get a deep understanding of each web attack’s anatomy and objectives
  • Understand both the offensive and defensive mindset
  • Learn techniques and strategies for creative thinking and problem solving, to detect innovative ways of exploiting Ruby and related frameworks’ security vulnerabilities

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”10px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)”]

  • Write secure code in Ruby and catch application security threats early
  • Learn to identify the root cause of problems and how to fix them
  • Get a deep understanding of each web attack’s anatomy and objectives
  • Understand both the offensive and defensive mindset
  • Learn techniques and strategies for creative thinking and problem solving, to detect innovative ways of exploiting Ruby and related frameworks’ security vulnerabilities

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.9.10″ background_enable_color=”off” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/ruby-security-training-avatao.png” alt=”ruby security training” title_text=”ruby security training avatao” align=”center” _builder_version=”4.9.10″ _module_preset=”default” width=”50%” width_tablet=”” width_phone=”” width_last_edited=”on|tablet” max_width=”100%” module_alignment=”center” custom_margin=”0px||0px||false|false”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”60px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.6.0″ _module_preset=”default” header_3_font=”Barlow|800|||||||” header_3_text_color=”#ffffff” header_3_font_size=”40px” custom_margin=”-10px||-5px||false|false”]

Explore Avatao’s training in other programming languages:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/java-avatao-content.png” title_text=”java avatao content” url=”https://staging.avatao.martengartner.com/java-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/javascript-avatao-content.png” title_text=”javascript avatao content” url=”https://staging.avatao.martengartner.com/javascript-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/kotlin-avatao-content.png” title_text=”kotlin avatao content” url=”https://staging.avatao.martengartner.com/kotlin-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/c-avatao-content.png” title_text=”c avatao content” url=”https://staging.avatao.martengartner.com/c-cpp-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_4,1_4,1_4,1_4″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-20px||-15px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/csharp-avatao-content-.png” title_text=”csharp avatao content” url=”https://staging.avatao.martengartner.com/c-sharp-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/python-avatao-content.png” title_text=”python avatao content” url=”https://staging.avatao.martengartner.com/python-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/nodejs-avatao-content.png” title_text=”nodejs avatao content” url=”https://staging.avatao.martengartner.com/node-js-security-training/” _builder_version=”4.9.10″ _module_preset=”default”][/et_pb_image][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”4.6.0″ _module_preset=”default”][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”RGBA(0,0,0,0)” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ custom_margin_tablet=”” custom_margin_phone=”-55px||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” width=”82%” max_width=”1665px” custom_margin=”-15px||-10px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_font_size=”50px” header_line_height=”1.3em” header_2_font=”|800|||||||” header_2_font_size=”50px” text_orientation=”right” background_layout=”dark” module_alignment=”right” custom_margin=”0px|0px|0px|0px|false|false” custom_padding=”0px|25px|0px|0px|false|false” header_font_size_tablet=”” header_font_size_phone=”” header_font_size_last_edited=”on|desktop” header_2_font_size_tablet=”” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|tablet” locked=”off”]

Get started with Ruby security training

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|500|||||||” text_text_color=”#ffffff” text_font_size=”16px” text_line_height=”1.9em” header_5_font_size=”20px” header_5_line_height=”1.3em” background_layout=”dark” width=”95.8%” custom_margin=”0px|-59px|0px|0px|false|false” custom_padding=”30px|0px|30px||false|false” hover_enabled=”0″ locked=”off” sticky_enabled=”0″]

Start onboarding your team right away and introduce Ruby security training to your company efficiently.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”center” module_id=”demo-java-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”0px|25px||0px|false|false” custom_margin_tablet=”” custom_margin_phone=”0px|0px||0px|false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|desktop” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|phone” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.10″ background_color=”#2b3669″ positioning=”none” vertical_offset=”1000px” horizontal_offset=”0px” position_origin_a_tablet=”” position_origin_a_phone=”” position_origin_a_last_edited=”on|desktop” position_origin_f_tablet=”” position_origin_f_phone=”” position_origin_f_last_edited=”on|desktop” position_origin_r_tablet=”” position_origin_r_phone=”” position_origin_r_last_edited=”on|desktop” width=”100%” min_height=”378px” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”0px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||||false|false” positioning_tablet=”” positioning_phone=”” positioning_last_edited=”on|phone” global_module=”2141″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”4.9.10″ width=”86%” max_width=”1288px” custom_margin=”30px||30px||false|false” custom_padding=”10px||0px||false|false” locked=”off”][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/avatao-logo-white.png” alt=”avatao” title_text=”avatao logo white” show_bottom_space=”off” align_tablet=”” align_phone=”center” align_last_edited=”on|phone” _builder_version=”4.9.10″ width_tablet=”65%” width_phone=”50%” width_last_edited=”on|tablet” custom_margin=”60px||0px||false|false” custom_margin_tablet=”||30px||false|false” custom_margin_phone=”||60px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false”][/et_pb_image][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” custom_margin=”20px||0px||false|false” custom_padding=”||15px||false|false” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]

Follow us

[/et_pb_text][et_pb_social_media_follow admin_label=”Social Media Follow” _builder_version=”4.6.0″ text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”][et_pb_social_media_follow_network social_network=”linkedin” url=”https://www.linkedin.com/company/avatao/” _builder_version=”4.5.1″ background_color=”#007bb6″ follow_button=”off” url_new_window=”on”]linkedin[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”twitter” url=”https://twitter.com/theavatao” _builder_version=”4.5.1″ background_color=”#00aced” follow_button=”off” url_new_window=”on”]twitter[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”facebook” url=”https://www.facebook.com/theavatao/” _builder_version=”4.5.1″ background_color=”#3b5998″ follow_button=”off” url_new_window=”on”]facebook[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”instagram” url=”https://www.instagram.com/theavatao/” _builder_version=”4.6.0″ _module_preset=”default” background_color=”#ea2c59″ follow_button=”off” url_new_window=”on”]instagram[/et_pb_social_media_follow_network][/et_pb_social_media_follow][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]

Copyright © 2024 Avatao

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.8″ custom_padding=”|||10px|false|false”][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”

Secure coding training

For managers

For developers

Compliance training

Capture The Flag

Why Avatao?

Platform features

Content we cover

Pricing

.

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_text_color=”#FFFFFF” header_2_text_color=”#FFFFFF” header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Secure coding training

Compliance Training

Continuous Learning

Capture The Flag

Platform features

Content we cover

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”

Secure coding training

For managers

For developers

Compliance training

Capture The Flag

Why Avatao?

Platform features

Content we cover

Pricing

Company

Our story

Company culture

Meet the team

Careers

Internship at Avatao

” content_phone=”

Resources

Blog

Customer stories

Ebooks and guides

Release notes

FAQ

.

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|50px||true|false” custom_margin_tablet=”” custom_margin_phone=”90px||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Resources

Blog

Customer stories

Ebooks and guides

For developers

FAQ

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”

Resources

Blog

Customer stories

Ebooks and guides

Release notes

FAQ

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

” content_phone=”

Company

Our story

Company culture

Meet the team

Careers

Internship at Avatao

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”90px|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Company

Our story

Why Avatao?

Company culture

Internship at Avatao

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”20px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]