.et_pb_section_5.et_pb_section,.et_pb_section_6.et_pb_section{background-color:#f1fafe!important}.et_pb_button_3,.et_pb_button_3:after,.et_pb_button_4,.et_pb_button_4:after,.et_pb_button_5,.et_pb_button_5:after{transition:all 300ms ease 0ms}.et_pb_image_4 .et_pb_image_wrap,.et_pb_image_5 .et_pb_image_wrap{border-radius:10px 10px 10px 10px;overflow:hidden}.et_pb_image_4,.et_pb_image_5{text-align:center}div.et_pb_section.et_pb_section_7{background-image:url(https://thesisstrategy.com/wp-content/uploads/2025/11/cyber-security-17.png),radial-gradient(circle at top right,#00bfa6 0%,#00bfa6 100%)!important}.et_pb_section_7{overflow-x:visible;overflow-y:visible;z-index:10;position:relative}body #page-container .et_pb_section .et_pb_button_5{color:#00BFA6!important;border-color:#FFFFFF;background-color:#FFFFFF}body #page-container .et_pb_section .et_pb_button_5:hover{color:#FFFFFF!important;border-color:#2A3B5F!important;background-image:initial;background-color:#2A3B5F}.et_pb_button_5{transition:color 300ms ease 0ms,background-color 300ms ease 0ms,border 300ms ease 0ms}@media only screen and (max-width:980px){.et_pb_image_4 .et_pb_image_wrap img,.et_pb_image_5 .et_pb_image_wrap img{width:auto}body #page-container .et_pb_section .et_pb_button_5:after{display:inline-block;opacity:0}body #page-container .et_pb_section .et_pb_button_5:hover:after{opacity:1}}@media only screen and (max-width:767px){.et_pb_image_4 .et_pb_image_wrap img,.et_pb_image_5 .et_pb_image_wrap img{width:auto}body #page-container .et_pb_section .et_pb_button_5:after{display:inline-block;opacity:0}body #page-container .et_pb_section .et_pb_button_5:hover:after{opacity:1}}