__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
Home
Courses
Use Cases
Pricing
Resources
Courses
Windows Threat and Malware Management
Why do we have to protect windows from threats and malware?
Cloud System’s Security
Cloud Visibility and Control
Cloud Visibility and Control
Mark lesson complete
Comments are closed.
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
Pen
Comments are closed.