{"id":1053,"date":"2026-01-14T14:06:44","date_gmt":"2026-01-14T14:06:44","guid":{"rendered":"https:\/\/sauguskodas.lt\/?page_id=1053"},"modified":"2026-01-30T21:22:27","modified_gmt":"2026-01-30T21:22:27","slug":"certified-ethical-hacker-ceh","status":"publish","type":"page","link":"https:\/\/sauguskodas.lt\/lt\/certified-ethical-hacker-ceh\/","title":{"rendered":"Certified Ethical Hacker (CEH)"},"content":{"rendered":"<div class=\"wp-block-greenshift-blocks-row gspb_row gspb_row-id-gsbp-8cad913 gspb_row--gutter-custom-0\" id=\"gspb_row-id-gsbp-8cad913\"><div class=\"gspb_row__content\"> \n<div class=\"wp-block-greenshift-blocks-row-column gspb_row__col--9 gspb_row__col--md-12 gspb_col-id-gsbp-6a3bc96\" id=\"gspb_col-id-gsbp-6a3bc96\">\n\n\n<h1 id=\"gspb_heading-id-gsbp-d302bf1\" class=\"gspb_heading gspb_heading-id-gsbp-d302bf1\">Certified Ethical Hacker (CEH v13 AI)<\/h1>\n<\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-row-column gspb_row__col--3 gspb_row__col--md-12 gspb_col-id-gsbp-ae00069\" id=\"gspb_col-id-gsbp-ae00069\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-1024x1024.png\" alt=\"\" class=\"wp-image-1115\" srcset=\"https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-1024x1024.png 1024w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-300x300.png 300w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-150x150.png 150w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-768x768.png 768w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-1536x1536.png 1536w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-2048x2048.png 2048w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CEH-12x12.png 12w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n <\/div><\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-row gspb_row gspb_row-id-gsbp-cac37db\" id=\"gspb_row-id-gsbp-cac37db\"><div class=\"gspb_row__content\"> \n<div class=\"wp-block-greenshift-blocks-row-column gspb_row__col--12 gspb_col-id-gsbp-df5e025\" id=\"gspb_col-id-gsbp-df5e025\">\n<div id=\"gspb_text-id-gsbp-e1466bf\" class=\"gspb_text gspb_text-id-gsbp-e1466bf\">\u0160i <strong><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noreferrer noopener\">Certified Ethical Hacker (CEH v13 AI)<\/a><\/strong> sertifikavimo programa yra viena i\u0161 labiausiai pasaulyje pripa\u017eint\u0173 etinio \u012fsilau\u017eimo (angl. ethical hacking) kvalifikacij\u0173, skirta ugdyti kibernetinio saugumo specialist\u0173 geb\u0117jim\u0105 m\u0105styti ir veikti kaip profesional\u016bs eti\u0161ki \u012fsilau\u017e\u0117liai. Programa suteikia \u017eini\u0173 ir praktini\u0173 \u012fg\u016bd\u017ei\u0173, reikaling\u0173 sistemingai identifikuoti saugumo pa\u017eeid\u017eiamumus, kontroliuojamai ir teis\u0117tai i\u0161naudoti silpn\u0105sias vietas bei taikyti veiksmingas technines ir organizacines atsakom\u0105sias priemones. Mokymai vykdomi realisti\u0161kose praktin\u0117se laboratorijose, naudojant pla\u010diai pramon\u0117je taikomus \u012frankius, metodikas ir ger\u0105sias kibernetinio saugumo praktikas.<br><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-gutena-tabs gutena-tabs-block gutena-tabs-block-ca18d1-4f\"><ul class=\"gutena-tabs-tab tab-flex\"><li class=\"gutena-tab-title active\" data-tab=\"1\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Mokymai<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"2\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Mokymo temos<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"3\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Karjera<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"4\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Egzaminas<\/div><\/div><\/div><\/li><\/ul><div class=\"gutena-tabs-content is-layout-flow wp-block-gutena-tabs-is-layout-flow\">\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-27d8fe-f6 active\" data-tab=\"1\">\n<div id=\"gspb_text-id-gsbp-adcfcae\" class=\"gspb_text gspb_text-id-gsbp-adcfcae\"><strong>Mokym\u0173 formatas<\/strong><br>Mokymai galimi\u00a0<strong>nuotoliniu b\u016bdu<\/strong>\u00a0arba\u00a0<strong>gyvai su instruktoriumi<\/strong>, suteikiant besimokantiesiems lankstumo pasirinkti format\u0105, atitinkant\u012f j\u0173 tvarkara\u0161t\u012f ir mokymosi stili\u0173.<br><br><strong>Mokym\u0173 trukm\u0117<\/strong><br>40 valand\u0173 (vedama instruktoriaus)<br><br><strong>\u012egyjami \u012fg\u016bd\u017eiai<\/strong><br>Etinio \u012fsilau\u017eimo metodai<br>Tinklo skenavimas<br>Sistemos ir \u017einiatinklio program\u0173 eksploatavimas<br>Kenk\u0117ji\u0161k\u0173 program\u0173 analiz\u0117<br>Socialin\u0117 in\u017einerija<br>Belaid\u017eio ry\u0161io ir daikt\u0173 interneto saugumas<br>Kriptografija ir saugumo protokolai<br>Reagavimas \u012f incidentus<br>Saugumo \u012franki\u0173 i\u0161manymas<br>Atitiktis ir rizikos valdymas<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-8f87d8-14 inactive\" data-tab=\"2\">\n<p style=\"margin-top:0;margin-bottom:0\"><strong>Module 01: Introduction to Ethical Hacking<\/strong><br>Suteikia etinio \u012fsilau\u017eimo ir informacijos saugumo pagrindus, \u012fskaitant pagrindinius principus, teisinius klausimus, atak\u0173 metodikas, etinio \u012fsilau\u017eimo sistemas ir atitikties standartus.<br><br><strong>Module 02: Footprinting and Reconnaissance<\/strong><br>Apima metodus ir \u012frankius, naudojamus preliminariai informacijai apie objekt\u0105 rinkti \u2013 tai labai svarbus pirmasis \u017eingsnis etinio \u012fsilau\u017eimo procese.<br><br><strong>Module 03: Scanning Networks<\/strong><br>Paai\u0161kina, kaip naudoti tinklo nuskaitymo metodus kompiuteriams, atviriems prievadams ir paslaugoms aptikti ir kaip \u012fsilau\u017e\u0117liai naudoja \u0161iuos metodus.<br><br><strong>Module 04: Enumeration<\/strong><br>I\u0161samiai nagrin\u0117jami pasyv\u016bs ir aktyv\u016bs informacijos rinkimo metodai.<br><br><strong>Module 05: Vulnerability Analysis<\/strong><br>Moko, kaip nustatyti sistem\u0173 ir tinkl\u0173 saugumo silpnybes naudojant pa\u017eeid\u017eiamum\u0173 vertinimo \u012frankius ir metodikas.<br><br><strong>Module 06: System Hacking<\/strong><br>Aptariami sistemos per\u0117mimo metodai, \u012fskaitant slapta\u017eod\u017ei\u0173 atakas, privilegij\u0173 eskalavim\u0105, p\u0117dsak\u0173 valym\u0105 ir p\u0117dsak\u0173 sl\u0117pim\u0105.<br><br><strong>Module 07: Malware Threats<\/strong><br>Supa\u017eindinama su \u012fvairi\u0173 tip\u0173 kenk\u0117ji\u0161komis programomis (pvz., Trojos arkliais, virusais, kirminais, be fail\u0173 veikian\u010diomis kenk\u0117ji\u0161komis programomis), kenk\u0117ji\u0161k\u0173 program\u0173 analiz\u0117s metodais ir atsakomosiomis priemon\u0117mis.<br><br><strong>Module 08: Sniffing<\/strong><br>Ap\u017evelgia tinklo \u0161nipin\u0117jimo atakas ir j\u0173 prevencijos b\u016bdus, supa\u017eindinant su pagrindiniais gr\u0117smi\u0173 aptikimo ir apsaugos principais.<br><br><strong>Module 09: Social Engineering<\/strong><br>Ap\u017evelgiami socialin\u0117s in\u017einerijos metodai, nukreipti \u012f \u017emogaus psichologij\u0105, \u012fskaitant suk\u010diavimo ir apsimetin\u0117jimo atakas bei vidines gr\u0117smes, taip pat pristatomos j\u0173 prevencijos priemon\u0117s.<br><br><strong>Module 10: Denial-of-Service<\/strong><br>Apima DoS ir DDoS atak\u0173 metodus, i\u0161naudojimo \u012frankius ir gynybos strategijas, skirtas paslaug\u0173 teikimo sutrikim\u0173 rizikai su\u0161velninti.<br><br><strong>Module 11: Session Hijacking<\/strong><br>D\u0117mesys sutelkiamas \u012f sesijos per\u0117mimo metodus.<br><br><strong>Module 12: Evading IDS, Firewalls, and Honeypots<\/strong><br>Mokoma \u012fsilau\u017e\u0117li\u0173 naudojam\u0173 metod\u0173, skirt\u0173 apeiti perimetro apsaug\u0105, \u012fsilau\u017eim\u0173 aptikimo sistemas (IDS), u\u017ekardas ir sp\u0105stus, ir kaip sustiprinti apsaug\u0105.<br><br><strong>Module 13: Hacking Web Servers<\/strong><br>Nagrin\u0117jami da\u017eniausiai pasitaikantys \u017einiatinklio serveri\u0173 pa\u017eeid\u017eiamumai, j\u0173 i\u0161naudojimo metodai ir priemon\u0117s \u017einiatinklio infrastrukt\u016brai apsaugoti.<br><br><strong>Module 14: Hacking Web Applications<\/strong><br>Suteikia \u012f\u017evalg\u0173 apie atakuojan\u010dias \u017einiatinklio programas, \u012fskaitant atak\u0173 vektorius, i\u0161naudojimo metodus ir saugaus kodavimo praktikas.<br><br><strong>Module 15: SQL Injection<\/strong><br>D\u0117mesys skiriamas SQL injekcijos atak\u0173 veikimo principams, j\u0173 atpa\u017einimo ir \u0161alinimo b\u016bdams, siekiant u\u017etikrinti duomen\u0173 baz\u0117mis pagr\u012fst\u0173 program\u0173 saugum\u0105.<br><br><strong>Module 16: Hacking Wireless Networks<\/strong><br>I\u0161samiai apra\u0161omi belaid\u017eio tinklo pa\u017eeid\u017eiamumai, \u0161ifravimo tr\u016bkumai, atak\u0173 metodikos ir gynybos taktika, siekiant apsaugoti belaid\u012f ry\u0161\u012f.<br><br><strong>Module 17: Hacking Mobile Platforms<\/strong><br>Apima mobili\u0173j\u0173 \u012frengini\u0173 gr\u0117smi\u0173 vektorius, \u012fskaitant \u201eAndroid\u201c ir \u201eiOS\u201c pa\u017eeid\u017eiamum\u0173 i\u0161naudojim\u0105, mobili\u0173j\u0173 \u012frengini\u0173 valdymo saugum\u0105 ir konkre\u010diai platformai skirtas atak\u0173 priemones.<br><br><strong>Module 18: IoT and OT Hacking<\/strong><br>Nagrin\u0117ja gr\u0117smes ir atak\u0173 metodus, nukreiptus prie\u0161 daikt\u0173 interneto (IoT) ir operacini\u0173 technologij\u0173 (OT) \u012frenginius, taip pat atitinkamas gynybines kontrol\u0117s priemones.<br><br><strong>Module 19: Cloud Computing<\/strong><br>Pristatomos debes\u0173 architekt\u016bros gr\u0117sm\u0117s ir saugumo strategijos, \u012fskaitant atakas prie\u0161 debes\u0173 paslaugas ir saugias debes\u0173 konfig\u016bracijas.<br><br><strong>Module 20: Cryptography<\/strong><br>Apima \u0161ifravimo algoritmus, kriptografinius \u012frankius, vie\u0161ojo rakto infrastrukt\u016br\u0105 (PKI), saug\u0173 ry\u0161\u012f ir \u012fprastus kriptoanaliz\u0117s metodus.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-e8685c-62 inactive\" data-tab=\"3\">\n<div id=\"gspb_text-id-gsbp-38780e3\" class=\"gspb_text gspb_text-id-gsbp-38780e3\"><strong>Etinis \u012fsilau\u017e\u0117lis (Ethical Hacker)<\/strong><br>Etiniai \u012fsilau\u017e\u0117liai yra profesionalai, kurie simuliuoja realaus pasaulio atakas, kad nustatyt\u0173 saugumo spragas. Jie teis\u0117tai ir atsakingai naudoja \u012fsilau\u017eimo metodus, siekdami pagerinti organizacijos saugumo lyg\u012f.<br><br><strong>\u012eslau\u017eimo testuotojas (Penetration Tester \/ Pentester)<\/strong><br>\u012esilau\u017eim\u0173 testuotojai atlieka atakas sistemose, programose ir tinkluose, siekdami atskleisti spragas.<br><br><strong>Kibernetinio saugumo analitikas (Cybersecurity Analyst)<\/strong><br>Kibernetinio saugumo analitikai stebi sistemas, analizuoja saugumo \u012fvykius ir padeda apsaugoti organizacijas nuo kibernetini\u0173 gr\u0117smi\u0173, taikydami aptikimo ir prevencijos strategijas.<br><br><strong>Saugumo analitikas (Security Analyst)<\/strong><br>Saugumo analitikai orientuojasi \u012f saugumo gr\u0117smi\u0173 identifikavim\u0105, analiz\u0119 ir reagavim\u0105 \u012f jas IT aplinkose. \u0160i pareigyb\u0117 da\u017enai sutampa su SOC ir kibernetinio saugumo analitiko funkcijomis.<br><br><strong>SOC analitikas (Tier 1 \/ Tier 2)<\/strong><br><strong><em>Tier 1<\/em>:<\/strong> Stebi ir klasifikuoja incidentus<br><strong><em>Tier 2<\/em>:<\/strong> Gr\u0117smi\u0173 paie\u0161ka, reagavimas \u012f incidentus<br><br><strong>Informacijos saugumo analitikas (Information Security Analyst)<\/strong><br>Atsakingas u\u017e jautrios informacijos apsaug\u0105, diegiant saugumo kontrol\u0117s priemones, politik\u0105 ir stebint sistemas, siekiant u\u017ekirsti keli\u0105 pa\u017eeidimams.<br><br><strong>Informacijos saugumo specialistas (Information Security Specialist)<\/strong><br>Prakti\u0161kas vaidmuo, orientuotas \u012f specifines saugumo sritis, tokias kaip galini\u0173 \u012frengini\u0173 apsauga, IAM ar duomen\u0173 saugumas.<br><br><strong>Tinkl\u0173 saugumo in\u017einierius (Network Security Engineer)<\/strong><br>Projektuoja, diegia ir valdo saugias tinklo infrastrukt\u016bras, \u012fskaitant ugniasienes, VPN ir \u012fsilau\u017eim\u0173 aptikimo sistemas.<br><br><strong>Kibernetinio gynybos analitikas (Cyber Defense Analyst)<\/strong><br>Orientuotas \u012f sistem\u0173 apsaug\u0105 nuo aktyvi\u0173 gr\u0117smi\u0173, stebi, aptinka ir reaguoja \u012f kibernetines atakas realiuoju laiku.<br><br><strong>Sprag\u0173 (vulnerabilities) analitikas (Vulnerability Analyst)<\/strong><br>Identifikuoja, vertina ir prioritetizuoja spragas sistemose ir programose bei bendradarbiauja su komandomis jas \u0161alinant.<br><br><strong>Gr\u0117smi\u0173 analitikas (Threat Analyst)<\/strong><br>Tiria kibernetines gr\u0117smes, \u012fsilau\u017e\u0117li\u0173 metodus.<br><br><strong>Incident\u0173 reagavimo analitikas (Incident Response Analyst)<\/strong><br>Vadovauja ir palaiko reagavim\u0105 \u012f saugumo incidentus, \u012fskaitant incident\u0173 valdym\u0105, \u0161alinim\u0105, atk\u016brim\u0105 ir analiz\u0119 po incidento.<br><br><strong>IT saugumo konsultantas (IT Security Consultant)<\/strong><br>Teikia organizacijoms konsultacijas d\u0117l saugumo, rizikos valdymo ir atitikties.<br><br><strong>Saugumo operacij\u0173 specialistas (Security Operations Specialist)<\/strong><br>Palaiko kasdienes saugumo operacijas, \u012fskaitant steb\u0117jim\u0105 ir incident\u0173 valdym\u0105.<br><br><strong>Raudonosios komandos analitikas (Red Team Analyst)<\/strong><br>Simuliuoja realias atakas, tikrindamas sistemos gynyb\u0105.<br><br><strong>M\u0117lynosios komandos analitikas (Blue Team Analyst)<\/strong><br>Gynybos specialistas, atsakingas u\u017e gr\u0117smi\u0173 aptikim\u0105, steb\u0117jim\u0105 ir organizacijos saugumo stiprinim\u0105.<br><br><strong>Program\u0173 saugumo analitikas (Application Security Analyst)<\/strong><br>Orientuotas \u012f programin\u0117s \u012frangos saugum\u0105, kodo per\u017ei\u016bra, atlieka saugumo testavim\u0105 ir integruoja saugumo praktikas (SDLC).<br><br><strong>Debes\u0173 saugumo analitikas (Cloud Security Analyst)<\/strong><br>Apsaugo debes\u0173 aplinkas.<br><br><strong>Rizikos ir atitikties analitikas (GRC \/ Risk &amp; Compliance Analyst)<\/strong><br>Orientuotas \u012f rizikos valdym\u0105 ir atitikt\u012f: rengia politik\u0105, atlieka rizikos vertinimus bei u\u017etikrina, kad organizacija laikyt\u0173si standart\u0173, toki\u0173 kaip ISO 27001, SOC 2, GDPR ir NIST2.<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-f47fbe-8c inactive\" data-tab=\"4\">\n<div id=\"gspb_text-id-gsbp-4883c85\" class=\"gspb_text gspb_text-id-gsbp-4883c85\"><strong>Egzamino formatas<\/strong><br>Pateikiamas klausimas ir keli galimi atsakymo variantai.<br><br><strong>Klausim\u0173 kiekis<\/strong><br>125<br><br><strong>Trukm\u0117 <\/strong><br>4 valandos<br><br><strong>Egzaminas vykdomas<\/strong><br>Nuotoliu per ECC portal\u0105<br><br><strong>I\u0161laikymo balas<\/strong><br>Tarp 60% ir 85%<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"gspb_button_wrapper gspb_button-id-gsbp-dc2dd20\" id=\"gspb_button-id-gsbp-dc2dd20\"><a class=\"wp-block-greenshift-blocks-buttonbox gspb-buttonbox wp-element-button\" href=\"https:\/\/sauguskodas.lt\/lt\/contact\/\" rel=\"noopener\"><span class=\"gspb-buttonbox-textwrap\"><span class=\"gspb-buttonbox-text\"><span class=\"gspb-buttonbox-title\">Become A CERTIFIED ETHICAL HACKER<\/span><\/span><span class=\"gspb-buttonbox-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:5rem;height:5rem;margin:10px\" viewbox=\"0 0 24 24\"><path fill-rule=\"evenodd\" d=\"M24 0v22.78h-2.87V4.9L2.03 24 0 21.97l19.1-19.1H1.26V0H24Z\"><\/path><\/svg><\/span><\/span><\/a><\/div>\n<\/div>\n <\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_gspb_post_css":"#gspb_row-id-gsbp-8cad913{justify-content:space-between;margin-top:0;display:flex;flex-wrap:wrap;margin-bottom:0;padding:0 80px}#gspb_row-id-gsbp-8cad913>.gspb_row__content{display:flex;justify-content:space-between;margin:0 auto;width:100%;flex-wrap:wrap}.gspb_row{position:relative}div[id^=gspb_col-id]{box-sizing:border-box;position:relative;padding:var(--gs-row-column-padding, 15px min(3vw, 20px))}@media (max-width:991.98px){#gspb_row-id-gsbp-8cad913>.gspb_row__content{row-gap:30px}}@media (max-width:991.98px){#gspb_row-id-gsbp-8cad913{margin-bottom:24px;padding-right:50px;padding-left:50px}}@media (max-width:575.98px){#gspb_row-id-gsbp-8cad913{margin-bottom:32px;padding-right:35px;padding-left:35px}}#gspb_row-id-gsbp-8cad913{min-height:300px}@media (max-width:575.98px){#gspb_row-id-gsbp-8cad913{min-height:100px}}#gspb_row-id-gsbp-8cad913{box-shadow:0 2px 4px 0 rgba(0,0,0,.07);background-color:var(--wp--preset--color--palette-color-7, var(--theme-palette-color-7, #F7FAFD))}#gspb_row-id-gsbp-8cad913,#gspb_row-id-gsbp-8cad913>.gspb_backgroundOverlay{border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px}#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:calc(75% - 5px)}@media (max-width:991.98px){#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:100%}}@media (max-width:767.98px){#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:calc(100% - 5px)}}@media (max-width:575.98px){#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:100%}}.gspb_row #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{margin-top:0;margin-right:0;margin-left:0;padding:70px 0}@media (max-width:991.98px){.gspb_row #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{padding-top:50px;padding-bottom:0}}@media (max-width:575.98px){.gspb_row #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{padding-bottom:0}}body #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{display:flex;flex-direction:column;justify-content:center}@media (max-width:991.98px){body #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{align-items:center}#gspb_heading-id-gsbp-d302bf1,#gspb_heading-id-gsbp-d302bf1 .gsap-g-line{text-align:center!important}}#gspb_heading-id-gsbp-d302bf1{margin-top:0;margin-bottom:0}@media (max-width:991.98px){#gspb_heading-id-gsbp-d302bf1{margin-bottom:42px}}@media (max-width:575.98px){#gspb_heading-id-gsbp-d302bf1{margin-bottom:40px}}#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:calc(25% - 25px)}@media (max-width:991.98px){#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:100%}}@media (max-width:767.98px){#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:calc(100% - 25px)}}@media (max-width:575.98px){#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:100%}}.gspb_row #gspb_col-id-gsbp-ae00069.gspb_row__col--3{padding:0}#gspb_col-id-gsbp-ae00069.gspb_row__col--3{transition:all .5s cubic-bezier(.42,0,.58,1);transform:translateY(0);transform-origin:center center}body #gspb_col-id-gsbp-ae00069.gspb_row__col--3{display:flex;flex-direction:column;justify-content:flex-end;align-items:center}#gspb_row-id-gsbp-cac37db{justify-content:space-between;margin-bottom:0;display:flex;flex-wrap:wrap;margin-top:80px}#gspb_row-id-gsbp-cac37db>.gspb_row__content{display:flex;justify-content:space-between;margin:0 auto;width:100%;flex-wrap:wrap}body.gspb-bodyfront #gspb_row-id-gsbp-8cad913>.gspb_row__content,body.gspb-bodyfront #gspb_row-id-gsbp-cac37db>.gspb_row__content{width:var(--theme-container-width, 1200px);max-width:var(--theme-normal-container-max-width, 1200px)}@media (max-width:575.98px){#gspb_row-id-gsbp-cac37db{margin-top:20px}}#gspb_col-id-gsbp-df5e025.gspb_row__col--12{width:100%}@media (max-width:575.98px){#gspb_col-id-gsbp-df5e025.gspb_row__col--12{width:100%}}.gspb_row #gspb_col-id-gsbp-df5e025.gspb_row__col--12{padding-right:0;padding-left:0}.gspb_text-id-gsbp-e1466bf{font-size:18px}@media (max-width:575.98px){.gspb_text-id-gsbp-e1466bf{font-size:16px}}.gspb_text-id-gsbp-e1466bf{margin-bottom:15px!important}@media (max-width:991.98px){.gspb_text-id-gsbp-e1466bf{margin-top:0!important}}@media (max-width:575.98px){.gspb_text-id-gsbp-e1466bf{margin-right:0!important;margin-left:0!important}}.gspb_text-id-gsbp-adcfcae{margin-top:0!important}.gspb_text-id-gsbp-38780e3,.gspb_text-id-gsbp-4883c85{margin-bottom:0!important}#gspb_button-id-gsbp-dc2dd20{display:flex;justify-content:flex-start}#gspb_button-id-gsbp-dc2dd20 .gspb-buttonbox-text{display:flex;flex-direction:column}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox{box-sizing:border-box}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox>.gspb-buttonbox-textwrap>.gspb-buttonbox-icon{display:flex}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox .gspb-buttonbox-icon svg{height:13px!important;width:13px!important;min-width:13px!important;fill:currentColor!important;margin:0!important}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox .gspb-buttonbox-icon svg path{fill:currentColor!important}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox>.gspb-buttonbox-textwrap{display:flex;flex-direction:row;align-items:center}#gspb_button-id-gsbp-dc2dd20 .gspb-buttonbox-icon{margin-left:13px}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox{margin-top:40px;margin-bottom:40px}@media (max-width:575.98px){#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox{margin-top:44px}}","footnotes":""},"class_list":["post-1053","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6},"vertical_spacing_source":"custom","content_area_spacing":"bottom"},"_links":{"self":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages\/1053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/comments?post=1053"}],"version-history":[{"count":30,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages\/1053\/revisions"}],"predecessor-version":[{"id":1217,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages\/1053\/revisions\/1217"}],"wp:attachment":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/media?parent=1053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}