Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 01 - Connaître le top 10 de l-OWASP (4:11)
- 02 - Découvrir la sécurité applicative (3:48)
- 03 - Découvrir l-injection SQL (4:07)
- 04 - Découvrir les XSS (3:05)
- 05 - Aborder la falsification de requête (3:59)
- 06 - Découvrir la traversée de répertoire (2:53)
- 07 - Découvrir le débordement de mémoire tampon (3:02)
- 08 - Découvrir les risques liés aux cookies et aux pièces jointes (4:13)
- 09 - Aborder le détournement de session (3:43)
- 10 - Découvrir les attaques par exécution de code (2:30)
- 11 - Découvrir les attaques de réaffectation de privilèges (1:46)
- 12 - Découvrir les manipulations de pilote (2:07)
- 13 - Découvrir les vulnérabilités de mémoire (3:18)
- 14 - Découvrir les vulnérabilités de condition de concurrence (2:02)
- 02 - Utiliser les requêtes paramétrées (2:51)
- 01 - Utiliser la validation des entrées (2:25)
- 03 - Aborder les problèmes d-authentification et de gestion de session (1:41)
- 04 - Mettre en œuvre le codage de la sortie (3:01)
- 05 - Gérer les erreurs et les exceptions (2:47)
- 06 - Signer son code (1:59)
- 07 - Sécuriser les bases de données (3:33)
- 08 - Désidentifier des données (2:31)
- 09 - Comprendre l-obfuscation des données (2:01)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.