__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
Home
Courses
Use Cases
Pricing
Resources
Courses
Mobile Application Security
30,000 ft View on System’s Security
Cloud System’s Security
Securing cloud Windows Assets
Securing cloud Windows Assets
Mark lesson complete
Comments are closed.
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
Pen
Comments are closed.