[et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”#2b3669″ custom_margin=”0px||0px||false|false”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”||-30px||false|false”][et_pb_column type=”3_5″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow|800|||||||” text_text_color=”#242424″ text_font_size=”50px” text_line_height=”1.2em” header_font=”Barlow|800|||||||” header_text_color=”#FFFFFF” header_font_size=”60px” header_line_height=”1.1em” header_2_font=”Barlow|800|||||||” header_2_font_size=”74px” text_font_size_tablet=”” text_font_size_phone=”47px” text_font_size_last_edited=”on|phone” header_font_size_tablet=”62px” header_font_size_phone=”44px” header_font_size_last_edited=”on|phone” header_2_font_size_tablet=”62px” header_2_font_size_phone=”44px” header_2_font_size_last_edited=”on|desktop” locked=”off”]

Real-world vulnerabilities in a safe environment

[/et_pb_text][et_pb_text content_tablet=”

Our training platform offers your developers interactive exercises based on real-world issues discovered by security researchers and bug bounty hunters. Avatao allows your team to experience these vulnerabilities in a safe environment, helping them expand their awareness of these issues and write secure code from the start!

” content_phone=”

Our training platform offers your developers interactive exercises based on real-world issues discovered by security researchers and bug bounty hunters. Avatao allows your team to experience these vulnerabilities in a safe environment, helping them expand their awareness of these issues and write secure code from the start!

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||45px||false|false” custom_padding=”0px||||false|false” locked=”off”]

Our training platform offers your developers interactive exercises based on real-world issues discovered by security researchers and bug bounty hunters. Avatao allows your team to experience these vulnerabilities in a safe environment, helping them expand their awareness of these issues and  write secure code from the start!

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”left” button_alignment_tablet=”” button_alignment_phone=”center” button_alignment_last_edited=”on|phone” module_id=”demo-home-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” custom_margin=”0px|25px|0px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|phone” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|desktop” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null”][/et_pb_button][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/recent-security-breaches.png” alt=”recent security breaches” title_text=”recent security breaches” align=”center” _builder_version=”4.9.10″ _module_preset=”default” width=”75%” width_tablet=”65%” width_phone=”” width_last_edited=”on|tablet” custom_margin=”-30px||||false|false” custom_margin_tablet=”0px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|tablet”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_start=”#2b3669″ background_color_gradient_end=”#36acac” background_enable_image=”off” custom_margin=”0px|||-6px|false|false” custom_margin_tablet=”” custom_margin_phone=”-42px||||false|false” custom_margin_last_edited=”on|phone” locked=”off”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-10px||-20px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#242424″ text_font_size=”50px” text_line_height=”1.2em” header_font_size=”32px” header_line_height=”1.4em” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”-20px|||10px|false|false” header_font_size_tablet=”” header_font_size_phone=”32px” header_font_size_last_edited=”on|phone” locked=”off”]

A new day, a new breach

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”10px||-15px||false|false” custom_margin_tablet=”” custom_margin_phone=”0px||30px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|100px||100px|false|false” custom_padding_tablet=”” custom_padding_phone=”|33px|30px|33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”60px|30px|60px|30px|true|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|phone” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb content_max_width=”768px” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#2a3749″ header_font_size=”29px” header_line_height=”1.4em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” background_color=”rgba(0,0,0,0)” background_image=”https://staging.avatao.martengartner.com/file/2020/08/small-bg-1-12.svg” background_size=”contain” background_position=”bottom_right” module_alignment=”center” custom_margin=”-15px|-30px|-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”|30px|0px|0px|false|false” animation=”off” header_font_tablet=”” header_font_phone=”” header_font_last_edited=”on|phone” header_font_size_tablet=”” header_font_size_phone=”27px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” locked=”off”]

Every day, new security breaches and vulnerabilities are discovered. Security researchers, bug bounty hunters, and hackers work day and night trying to find vulnerabilities in companies’ assets before the bad guys do. After the issue gets fixed, the researchers usually publish these bugs and release them to the security community. At Avatao, our content team works hard to recreate the most relevant ones as interactive exercises for the platform.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”60px||0px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#ffffff” header_2_font_size=”40px” custom_margin=”||0px||false|false” locked=”off”]

What are bug bounty programs?

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-30px||30px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default” custom_padding=”|||0px|false|false”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”10px||||false|false” custom_padding=”0px||||false|false” locked=”off”]

More and more companies are starting to advertise incentivized vulnerability disclosure programs. They invite security researchers and hackers to test their applications for security vulnerabilities. If a researcher finds a qualifying vulnerability, the company issues a financial reward, otherwise known as a “bounty”.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”-35px||-30px||false|false” custom_margin_tablet=”” custom_margin_phone=”-10px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”The first step to avoiding vulnerabilities is..” content_max_width=”768px” content_tablet=”

Knowing about them, of course! If your developers familiarize themselves with the vulnerabilities, they are less likely to introduce the same bugs again when writing new code. Anticipating what could go wrong, as well as regularly looking at the application from an attacker’s perspective, are powerful tools for writing code that is secure right from the beginning.

” content_phone=”

Knowing about them, of course! If your developers familiarize themselves with the vulnerabilities, they are less likely to introduce the same bugs again when writing new code. Anticipating what could go wrong, as well as regularly looking at the application from an attacker’s perspective, are powerful tools for writing code that is secure right from the beginning.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||-20px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

Knowing about them, of course! If your developers familiarize themselves with the vulnerabilities, they are less likely to introduce the same bugs again when writing new code. Anticipating what could go wrong, as well as regularly looking at the application from an attacker’s perspective, are powerful tools for writing code that is secure right from the beginning.

 

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row make_equal=”on” custom_padding_last_edited=”on|phone” _builder_version=”4.9.10″ background_enable_color=”off” width=”100%” max_width=”1445px” max_width_tablet=”” max_width_phone=”120%” max_width_last_edited=”on|phone” custom_margin=”0px||-10px||false|false” custom_margin_tablet=”” custom_margin_phone=”-30px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|260px||260px|false|true” custom_padding_tablet=”|50px||50px|false|true” custom_padding_phone=”|33px||33px|false|true” locked=”off”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ background_color=”rgba(255,255,255,0.1)” background_enable_image=”off” background_size=”initial” background_position=”top_right” custom_padding=”35px|30px|0px|30px|false|true” custom_padding_tablet=”30px||30px||true|true” custom_padding_phone=”|20px||20px|true|true” custom_padding_last_edited=”on|desktop” border_radii=”on|15px|15px|15px|15px” box_shadow_style=”preset1″ box_shadow_color=”rgba(12,113,195,0.13)”][et_pb_blurb title=”It’s a sad truth, but..” content_max_width=”768px” content_tablet=”

The majority of breaches could have been avoided by a security-first mindset. Most data breaches are caused by the lack of responsibility developers have for the code they write. Fixing a vulnerability will always be more expensive than writing secure code from the very beginning.

” content_phone=”

The majority of breaches could have been avoided by a security-first mindset. Most data breaches are caused by the lack of responsibility developers have for the code they write. Fixing a vulnerability will always be more expensive than writing secure code from the very beginning.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ header_level=”h3″ header_font=”Barlow|800|||||||” header_text_align=”left” header_text_color=”#FFFFFF” header_font_size=”30px” header_line_height=”1.3em” body_font=”Barlow|300|||||||” body_text_align=”justify” body_text_color=”#FFFFFF” body_font_size=”20px” body_line_height=”1.3em” body_ul_line_height=”1.5em” background_color=”rgba(0,0,0,0)” background_enable_image=”off” background_size=”contain” background_position=”bottom_right” module_alignment=”center” min_height=”180px” custom_margin=”-20px||-20px||false|false” custom_margin_tablet=”” custom_margin_phone=”||0px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px|1px||0px|false|false” animation=”off” header_font_size_tablet=”” header_font_size_phone=”26px” header_font_size_last_edited=”on|phone” body_font_size_tablet=”” body_font_size_phone=”17px” body_font_size_last_edited=”on|phone” body_letter_spacing_tablet=”” body_letter_spacing_phone=”” body_letter_spacing_last_edited=”on|desktop” custom_css_blurb_content=”||” border_width_all=”13px” border_color_all=”rgba(0,0,0,0)” locked=”off”]

The majority of breaches could have been avoided by a security-first mindset. Most data breaches are caused by the lack of responsibility developers have for the code they write. Fixing a vulnerability will always be more expensive than writing secure code from the very beginning.

 

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_enable_color=”off” use_background_color_gradient=”on” background_color_gradient_start=”#36acac” background_color_gradient_end=”#2b3669″ background_enable_image=”off” custom_margin=”-10px||-20px||false|false”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default”][et_pb_column type=”4_4″ _builder_version=”4.9.10″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” header_2_font=”Barlow|800|||||||” header_2_text_color=”#FFFFFF” header_2_font_size=”40px” custom_margin=”-30px||0px||false|false”]

Bug bounties & famous vulnerabilities

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_font_size=”21px” text_line_height=”1.2em” text_orientation=”center” custom_margin=”15px|||11px|false|false” locked=”off”]

Avatao’s interactive exercises include:

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” custom_margin=”-10px||||false|false”][et_pb_column type=”4_4″ _builder_version=”4.6.0″ _module_preset=”default”][et_pb_text content_tablet=”

  • A recreation of a vulnerability in Facebook’s birthday video uploading feature which exposed 50 million user accounts

” content_phone=”

  • A recreation of a vulnerability in Facebook’s birthday video uploading feature which exposed 50 million user accounts

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||45px||false|false” custom_padding=”0px||||false|false” locked=”off”]

  • A recreation of a vulnerability in Facebook’s birthday video uploading feature which exposed 50 million user accounts

[/et_pb_text][et_pb_text content_tablet=”

  • A tutorial based on a $25,000 vulnerability that allowed a researcher to gain access to the GitHub account of a victim with a single click on a malicious link

” content_phone=”

  • A tutorial based on a $25,000 vulnerability that allowed a researcher to gain access to the GitHub account of a victim with a single click on a malicious link

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”-45px||0px||false|false” custom_padding=”0px||||false|false” locked=”off”]

  • A tutorial based on a $25,000 vulnerability that allowed a researcher to gain access to the GitHub account of a victim with a single click on a malicious link

[/et_pb_text][et_pb_text content_tablet=”

  • A hands-on walkthrough of an XSS in Google search from 2019 caused by improper HTML sanitization of the client

” content_phone=”

  • A hands-on walkthrough of an XSS in Google search from 2019 caused by improper HTML sanitization of the client

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||0px||false|false” custom_padding=”0px||||false|false” locked=”off”]

  • A hands-on walkthrough of an XSS in Google search from 2019 caused by improper HTML sanitization of the client

[/et_pb_text][et_pb_text content_tablet=”

  • An exciting challenge on the Remote Code Execution (RCE) vulnerability found in Log4j.

” content_phone=”

  • An exciting challenge on the Remote Code Execution (RCE) vulnerability found in Log4j.

” content_last_edited=”on|phone” _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||0px||false|false” custom_padding=”0px||||false|false” locked=”off”]

  • An exciting challenge on the Remote Code Execution (RCE) vulnerability found in Log4j.

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ _module_preset=”default” text_text_color=”#FFFFFF” text_font_size=”20px” text_line_height=”1.3em” custom_margin=”0px||0px||false|false” custom_padding=”0px||||false|false” locked=”off”]

  • .. and many more!

[/et_pb_text][et_pb_button button_url=”https://next.avatao.com/direct?orgid=cafdc337-3c84-41d0-9406-447779b06a08&module=3d158303-dabd-4d0a-bb52-a5e167fd46bf” url_new_window=”on” button_text=”Try a related exercise” button_alignment=”center” module_id=”learnmore-home-languages” _builder_version=”4.9.10″ custom_button=”on” button_text_size=”22px” button_text_color=”#3dffdb” button_bg_color=”RGBA(0,0,0,0)” button_border_width=”2px” button_border_color=”#3dffdb” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|600|||||||” button_use_icon=”off” background_layout=”dark” custom_margin=”25px|0px||0px|false|false” custom_padding=”5px|56px|5px|56px|true|true” button_text_size_tablet=”” button_text_size_phone=”16px” button_text_size_last_edited=”on|phone” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|desktop” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” locked=”off” button_letter_spacing__hover=”2px” button_letter_spacing__hover_enabled=”on”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.10″ _module_preset=”default” background_color=”#2b3669″ locked=”off”][et_pb_row _builder_version=”4.9.10″ _module_preset=”default” width=”82%” max_width=”1665px” custom_margin=”-70px||-10px||false|false”][et_pb_column type=”4_4″ _builder_version=”4.5.1″ _module_preset=”default”][et_pb_text _builder_version=”4.9.10″ header_font=”Barlow|800|||||||” header_font_size=”50px” header_line_height=”1.3em” header_2_font=”|800|||||||” header_2_font_size=”50px” text_orientation=”right” background_layout=”dark” module_alignment=”right” custom_margin=”50px|0px|0px|0px|false|false” custom_padding=”0px|25px|0px|0px|false|false” header_text_align_tablet=”” header_text_align_phone=”” header_text_align_last_edited=”on|tablet” header_font_size_last_edited=”off|desktop” header_2_font_size_phone=”50px” header_2_font_size_last_edited=”off|phone” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone” locked=”off”]

Get started with secure coding training today

[/et_pb_text][et_pb_text _builder_version=”4.9.10″ text_font=”Barlow|500|||||||” text_text_color=”#ffffff” text_font_size=”22px” text_line_height=”1.9em” header_5_text_color=”#ffffff” header_5_font_size=”22px” background_layout=”dark” width=”95.8%” custom_margin=”0px|-59px|0px|0px|false|false” custom_padding=”30px|0px|30px||false|false” header_5_text_align_tablet=”” header_5_text_align_phone=”center” header_5_text_align_last_edited=”on|phone” text_orientation_tablet=”” text_orientation_phone=”” text_orientation_last_edited=”on|phone” locked=”off”]

Reach out to our team and find out more about how your company could benefit from Avatao’s training platform.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI5OTQzIn19@” button_text=”Choose your plan” button_alignment=”center” button_alignment_tablet=”” button_alignment_phone=”center” button_alignment_last_edited=”on|phone” module_id=”demo-home-footer” _builder_version=”4.9.10″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”22px” button_text_color=”#2b3669″ button_bg_color=”#3dffdb” button_border_width=”2px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”14px” button_letter_spacing=”1px” button_font=”Barlow|700|||||||” button_use_icon=”off” custom_margin=”0px|25px|0px|0px|false|false” custom_margin_tablet=”” custom_margin_phone=”|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”5px|56px|5px|56px|true|true” animation_style=”zoom” animation_delay=”100ms” animation_intensity_zoom=”10%” hover_enabled=”0″ button_text_size_tablet=”” button_text_size_phone=”18px” button_text_size_last_edited=”on|phone” button_text_color_tablet=”” button_text_color_phone=”” button_text_color_last_edited=”on|desktop” box_shadow_style=”preset2″ box_shadow_color=”rgba(42,50,76,0.21)” button_letter_spacing_hover=”2px” locked=”off” button_text_size__hover_enabled=”off” button_text_size__hover=”null” button_one_text_size__hover_enabled=”off” button_one_text_size__hover=”null” button_two_text_size__hover_enabled=”off” button_two_text_size__hover=”null” button_text_color__hover_enabled=”off” button_text_color__hover=”null” button_one_text_color__hover_enabled=”off” button_one_text_color__hover=”null” button_two_text_color__hover_enabled=”off” button_two_text_color__hover=”null” button_border_width__hover_enabled=”off” button_border_width__hover=”null” button_one_border_width__hover_enabled=”off” button_one_border_width__hover=”null” button_two_border_width__hover_enabled=”off” button_two_border_width__hover=”null” button_border_color__hover_enabled=”off” button_border_color__hover=”null” button_one_border_color__hover_enabled=”off” button_one_border_color__hover=”null” button_two_border_color__hover_enabled=”off” button_two_border_color__hover=”null” button_border_radius__hover_enabled=”off” button_border_radius__hover=”null” button_one_border_radius__hover_enabled=”off” button_one_border_radius__hover=”null” button_two_border_radius__hover_enabled=”off” button_two_border_radius__hover=”null” button_letter_spacing__hover_enabled=”on” button_letter_spacing__hover=”2px” button_one_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover=”null” button_two_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover=”null” button_bg_color__hover_enabled=”off” button_bg_color__hover=”null” button_one_bg_color__hover_enabled=”off” button_one_bg_color__hover=”null” button_two_bg_color__hover_enabled=”off” button_two_bg_color__hover=”null” sticky_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Footer” _builder_version=”4.9.10″ background_color=”#2b3669″ positioning=”none” vertical_offset=”1000px” horizontal_offset=”0px” position_origin_a_tablet=”” position_origin_a_phone=”” position_origin_a_last_edited=”on|desktop” position_origin_f_tablet=”” position_origin_f_phone=”” position_origin_f_last_edited=”on|desktop” position_origin_r_tablet=”” position_origin_r_phone=”” position_origin_r_last_edited=”on|desktop” width=”100%” min_height=”378px” overflow-x=”hidden” overflow-y=”hidden” custom_margin=”0px||0px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||||false|false” positioning_tablet=”” positioning_phone=”” positioning_last_edited=”on|phone” global_module=”2141″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”4.9.10″ width=”86%” max_width=”1288px” custom_margin=”30px||30px||false|false” custom_padding=”10px||0px||false|false” locked=”off”][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_image src=”https://staging.avatao.martengartner.com/wp-content/uploads/avatao-logo-white.png” alt=”avatao” title_text=”avatao logo white” show_bottom_space=”off” align_tablet=”” align_phone=”center” align_last_edited=”on|phone” _builder_version=”4.9.10″ width_tablet=”65%” width_phone=”50%” width_last_edited=”on|tablet” custom_margin=”60px||0px||false|false” custom_margin_tablet=”||30px||false|false” custom_margin_phone=”||60px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false”][/et_pb_image][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” custom_margin=”20px||0px||false|false” custom_padding=”||15px||false|false” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]

Follow us

[/et_pb_text][et_pb_social_media_follow admin_label=”Social Media Follow” _builder_version=”4.6.0″ text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”][et_pb_social_media_follow_network social_network=”linkedin” url=”https://www.linkedin.com/company/avatao/” _builder_version=”4.5.1″ background_color=”#007bb6″ follow_button=”off” url_new_window=”on”]linkedin[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”twitter” url=”https://twitter.com/theavatao” _builder_version=”4.5.1″ background_color=”#00aced” follow_button=”off” url_new_window=”on”]twitter[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”facebook” url=”https://www.facebook.com/theavatao/” _builder_version=”4.5.1″ background_color=”#3b5998″ follow_button=”off” url_new_window=”on”]facebook[/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=”instagram” url=”https://www.instagram.com/theavatao/” _builder_version=”4.6.0″ _module_preset=”default” background_color=”#ea2c59″ follow_button=”off” url_new_window=”on”]instagram[/et_pb_social_media_follow_network][/et_pb_social_media_follow][et_pb_text _builder_version=”4.9.10″ text_text_color=”#FFFFFF” text_orientation_tablet=”” text_orientation_phone=”center” text_orientation_last_edited=”on|phone”]

Copyright © 2024 Avatao

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.8″ custom_padding=”|||10px|false|false”][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”

Secure coding training

For managers

For developers

Compliance training

Capture The Flag

Why Avatao?

Platform features

Content we cover

Pricing

.

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_text_color=”#FFFFFF” header_2_text_color=”#FFFFFF” header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Secure coding training

Compliance Training

Continuous Learning

Capture The Flag

Platform features

Content we cover

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”

Secure coding training

For managers

For developers

Compliance training

Capture The Flag

Why Avatao?

Platform features

Content we cover

Pricing

Company

Our story

Company culture

Meet the team

Careers

Internship at Avatao

” content_phone=”

Resources

Blog

Customer stories

Ebooks and guides

Release notes

FAQ

.

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|50px||true|false” custom_margin_tablet=”” custom_margin_phone=”90px||-70px||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Resources

Blog

Customer stories

Ebooks and guides

For developers

FAQ

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”

Resources

Blog

Customer stories

Ebooks and guides

Release notes

FAQ

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

” content_phone=”

Company

Our story

Company culture

Meet the team

Careers

Internship at Avatao

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”90px|0px|||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

Company

Our story

Why Avatao?

Company culture

Internship at Avatao

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.4.5″][et_pb_text ul_type=”none” ul_item_indent=”1px” content_tablet=”” content_phone=”

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

” content_last_edited=”on|phone” disabled_on=”off|off|off” _builder_version=”4.9.10″ text_font=”Barlow||||||||” text_text_color=”#FFFFFF” text_line_height=”1.8em” link_text_color=”#474747″ ul_line_height=”2em” header_font=”Barlow||||||||” header_2_text_color=”#000000″ header_3_font=”Ubuntu|700|||||||” header_3_text_color=”#FFFFFF” header_3_line_height=”1.5em” custom_margin=”50px|0px|||false|false” custom_margin_tablet=”” custom_margin_phone=”20px||||false|false” custom_margin_last_edited=”on|phone” custom_padding=”|0px||0px|false|false” text_font_size_tablet=”” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” locked=”off”]

About

Investors & Partners

Terms of Service & Privacy Policy

Vulnerability Disclosure Policy

Contact us

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]