#footer-widgets .footer-widget a,#footer-widgets .footer-widget li a,#footer-widgets .footer-widget li a:hover{color:#ffffff}.footer-widget{color:#ffffff}#footer-info,#footer-info a{color:#ffffff}#footer-info,#footer-info a{font-weight:bold;font-style:normal;text-transform:none;text-decoration:none}#footer-bottom .et-social-icon a{color:#00eeff}.et_slide_in_menu_container,.et_slide_in_menu_container .et-search-field{letter-spacing:px}.et_slide_in_menu_container .et-search-field::-moz-placeholder{letter-spacing:px}.et_slide_in_menu_container .et-search-field::-webkit-input-placeholder{letter-spacing:px}.et_slide_in_menu_container .et-search-field:-ms-input-placeholder{letter-spacing:px}@media only screen and (min-width:981px){#logo{max-height:100%}.et_pb_svg_logo #logo{height:100%}}@media only screen and (min-width:1350px){.et_pb_row{padding:27px 0}.et_pb_section{padding:54px 0}.single.et_pb_pagebuilder_layout.et_full_width_page .et_post_meta_wrapper{padding-top:81px}.et_pb_fullwidth_section{padding:0}}div.et_pb_section.et_pb_section_0{background-position:bottom center;background-image:url(https://cyberawareness.tn/wp-content/uploads/2021/07/cyber-security-05-1.png),radial-gradient(circle at center,#004183 0%,#001f4c 100%)!important}.et_pb_section_0.et_pb_section{padding-top:6vw;padding-bottom:115px}.et_pb_row_0{z-index:10!important;position:relative}.et_pb_text_0 h1{font-family:'Overpass',Helvetica,Arial,Lucida,sans-serif;font-weight:900;font-size:84px}div.et_pb_section.et_pb_section_2{background-image:url(https://cyberawareness.tn/wp-content/uploads/2021/07/cyber-security-17.png),radial-gradient(circle at top right,#3122b2 0%,#00ffd8 100%)!important}.et_pb_section_2{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}.et_pb_section_2.et_pb_section{padding-bottom:10vw}@media only screen and (max-width:980px){.et_pb_text_0 h1{font-size:54px}}@media only screen and (max-width:767px){.et_pb_text_0 h1{font-size:32px}}