__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
Home
Courses
Use Cases
Pricing
Resources
Courses
Windows Threat and Malware Management
Fundamentals of Threats and Malware
The Overall Cyber Security Blueprint
How should we really think about Cyber Security
How should we really think about Cyber Security
Mark lesson complete
Comments are closed.
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
Pen
Comments are closed.