div.et_pb_section.et_pb_section_0{background-image:url(https://egi.utah.edu/wp-content/uploads/2022/08/cyber-security-08.png),radial-gradient(circle at top,#f7f7f7 66%,#ffffff 66%)!important}.et_pb_section_0.et_pb_section{padding-top:10px;padding-bottom:401px;background-color:#f7f7f7!important}.et_pb_row_0.et_pb_row{padding-top:30px!important;margin-top:-30px!important;margin-right:auto!important;margin-left:auto!important;padding-top:30px}.et_pb_row_1.et_pb_row{padding-top:20px!important;padding-bottom:57px!important;padding-left:20px!important;margin-top:-41px!important;margin-right:auto!important;margin-bottom:1px!important;margin-left:auto!important;padding-top:20px;padding-bottom:57px;padding-left:20px}.et_pb_text_6.et_pb_text{color:#FFFFFF!important}.et_pb_text_6{font-size:16px;background-color:#FFFFFF;padding-top:30px!important;padding-right:30px!important;padding-bottom:30px!important;padding-left:30px!important;margin-top:63px!important;margin-bottom:-4px!important}.et_pb_text_6 h1{font-family:'Bitter',Georgia,"Times New Roman",serif;font-size:60px;line-height:1.3em}.et_pb_column_6{padding-right:20px}@media only screen and (max-width:980px){div.et_pb_section.et_pb_section_0{background-position:right 0px center;background-image:url(https://egi.utah.edu/wp-content/uploads/2022/08/cyber-security-08.png),radial-gradient(circle at top,#f7f7f7 100%,#ffffff 100%)!important}.et_pb_section_0.et_pb_section{background-color:#f7f7f7!important}.et_pb_text_6 h1{font-size:50px}.et_pb_column_6{padding-right:0px}}@media only screen and (max-width:767px){.et_pb_section_0.et_pb_section{background-color:#f7f7f7!important}.et_pb_row_1.et_pb_row{padding-left:0px!important;padding-left:0px!important}.et_pb_text_6{font-size:14px}.et_pb_text_6 h1{font-size:30px}.et_pb_column_6{padding-right:0px}}