{"id":1055,"date":"2026-01-14T14:08:11","date_gmt":"2026-01-14T14:08:11","guid":{"rendered":"https:\/\/sauguskodas.lt\/?page_id=1055"},"modified":"2026-01-30T20:57:48","modified_gmt":"2026-01-30T20:57:48","slug":"certified-network-defender-cnd","status":"publish","type":"page","link":"https:\/\/sauguskodas.lt\/lt\/certified-network-defender-cnd\/","title":{"rendered":"Certified Network Defender (CND)"},"content":{"rendered":"<div class=\"wp-block-greenshift-blocks-row gspb_row gspb_row-id-gsbp-8cad913 gspb_row--gutter-custom-0\" id=\"gspb_row-id-gsbp-8cad913\"><div class=\"gspb_row__content\"> \n<div class=\"wp-block-greenshift-blocks-row-column gspb_row__col--9 gspb_row__col--md-12 gspb_col-id-gsbp-6a3bc96\" id=\"gspb_col-id-gsbp-6a3bc96\">\n\n\n<h1 id=\"gspb_heading-id-gsbp-d302bf1\" class=\"gspb_heading gspb_heading-id-gsbp-d302bf1\">Certified Network Defender (CND)<\/h1>\n<\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-row-column gspb_row__col--3 gspb_row__col--md-12 gspb_col-id-gsbp-ae00069\" id=\"gspb_col-id-gsbp-ae00069\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-1024x1024.png\" alt=\"\" class=\"wp-image-1117\" srcset=\"https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-1024x1024.png 1024w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-300x300.png 300w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-150x150.png 150w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-768x768.png 768w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-1536x1536.png 1536w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-2048x2048.png 2048w, https:\/\/sauguskodas.lt\/wp-content\/uploads\/2026\/01\/CND-12x12.png 12w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n <\/div><\/div>\n\n\n\n<div class=\"wp-block-greenshift-blocks-row gspb_row gspb_row-id-gsbp-cac37db\" id=\"gspb_row-id-gsbp-cac37db\"><div class=\"gspb_row__content\"> \n<div class=\"wp-block-greenshift-blocks-row-column gspb_row__col--12 gspb_col-id-gsbp-df5e025\" id=\"gspb_col-id-gsbp-df5e025\">\n<div id=\"gspb_text-id-gsbp-e1466bf\" class=\"gspb_text gspb_text-id-gsbp-e1466bf\">\u0160i <strong><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-network-security-course\/\" target=\"_blank\" rel=\"noreferrer noopener\">Certified Network Defender (CND)<\/a><\/strong> i\u0161sami tinklo saugumo ir gynybos programa, skirta suteikti specialistams praktini\u0173 \u017eini\u0173 ir \u012fg\u016bd\u017ei\u0173, reikaling\u0173 apsaugoti sistemas, laiku aptikti gr\u0117smes, tinkamai \u012f jas reaguoti ir prognozuoti galimus kibernetinius incidentus \u0161iuolaikin\u0117je organizacijos aplinkoje. Programa sujungia strategin\u012f saugumo suvokim\u0105 su praktiniu taikymu laboratoriniuose darbuose ir realisti\u0161kuose scenarijuose.<br><\/div>\n\n\n\n<div class=\"wp-block-gutena-tabs gutena-tabs-block gutena-tabs-block-ca18d1-4f\"><ul class=\"gutena-tabs-tab tab-flex\"><li class=\"gutena-tab-title active\" data-tab=\"1\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Mokymai<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"2\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Mokymo temos<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"3\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Karjera<\/div><\/div><\/div><\/li><li class=\"gutena-tab-title inactive\" data-tab=\"4\"><div class=\"gutena-tab-title-content icon-top\"><div class=\"gutena-tab-title-text\"><div>Egzaminas<\/div><\/div><\/div><\/li><\/ul><div class=\"gutena-tabs-content is-layout-flow wp-block-gutena-tabs-is-layout-flow\">\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-27d8fe-f6 active\" data-tab=\"1\">\n<div id=\"gspb_text-id-gsbp-adcfcae\" class=\"gspb_text gspb_text-id-gsbp-adcfcae\"><strong>Mokym\u0173 formatas<\/strong><br>Mokymai galimi <strong>nuotoliniu b\u016bdu<\/strong> arba <strong>gyvai su instruktoriumi<\/strong>, suteikiant besimokantiesiems lankstumo pasirinkti format\u0105, atitinkant\u012f j\u0173 tvarkara\u0161t\u012f ir mokymosi stili\u0173.<br><br><strong>Mokym\u0173 trukm\u0117<\/strong><br>40 valand\u0173 (vedama instruktoriaus)<br><br><strong>\u012egyjami \u012fg\u016bd\u017eiai<\/strong><br>Tinklo srauto analiz\u0117<br>Ugniasien\u0117, IDS\/IPS valdymas<br>Gr\u0117smi\u0173 aptikimas ir incident\u0173 tvarkymas<br>Tinklo stiprinimas<br>Saugumo politika ir atitiktis<br>Rizikos vertinimas ir ma\u017einimas<br>Praktiniai gynybos metodai<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-8f87d8-14 inactive\" data-tab=\"2\">\n<p style=\"margin-top:0;margin-bottom:0\"><strong>Module 01<\/strong>: <strong>Network Attacks and Defense Strategies<\/strong><br>Ap\u017evelgia pagrindines tinklo atakas ir apsaugos b\u016bdus, supa\u017eindina su gr\u0117smi\u0173 tipais, da\u017eniausiai taikomais atak\u0173 metodais bei pagrindiniais saugumo stiprinimo principais.<br><br><strong>Module 02<\/strong>: <strong>Administrative Network Security<\/strong><br>D\u0117mesys skiriamas politikai, standartams, atitik\u010diai, informavimo programoms ir turto valdymui \u2013 administracin\u0117s kontrol\u0117s mechanizm\u0173, kurie sudaro saugaus tinklo veikimo pagrind\u0105.<br><br><strong>Module 03<\/strong>: <strong>Technical Network Security<\/strong><br>Nagrin\u0117jamos technin\u0117s kontrol\u0117s priemon\u0117s, tokios kaip prieigos kontrol\u0117, autentifikavimas, tinklo segmentavimas, kriptografija ir saugios protokol\u0173 konfig\u016bracijos, kurios apsaugo tinklo sraut\u0105 ir duomen\u0173 vientisum\u0105.<br><br><strong>Module 04<\/strong>: <strong>Network Perimeter Security<\/strong><br>Mokoma, kaip apsaugoti \u012fmon\u0117s tinkl\u0173 ribas naudojant ugniasienes, VPN, IDS\/IPS ir kitus perimetro \u012frenginius \u2013 tai b\u016btina norint u\u017ekirsti keli\u0105 neteis\u0117tai prieigai ir i\u0161orin\u0117ms gr\u0117sm\u0117ms.<br><br><strong>Module 05<\/strong>: <strong>Endpoint Security \u2013 Windows Systems<\/strong><br>I\u0161samiai apra\u0161omas \u201eWindows\u201c pagrindu veikian\u010di\u0173 galini\u0173 \u012frengini\u0173 saugumas, \u012fskaitant patais\u0173 valdym\u0105, kenk\u0117ji\u0161k\u0173 program\u0173 apsaug\u0105, pagrindini\u0173 kompiuteri\u0173 u\u017ekardas ir konfig\u016bravimo praktikas, skirtas klient\u0173 ir serveri\u0173 sistem\u0173 apsaugai.<br><br><strong>Module 06<\/strong>: <strong>Endpoint Security \u2013 Linux Systems<\/strong><br>Pana\u0161us \u012f \u201eWindows\u201c galini\u0173 ta\u0161k\u0173 apsaug\u0105, ta\u010diau orientuotas \u012f \u201eLinux\u201c sistem\u0173 apsaug\u0105 naudojant prieigos kontrol\u0119, saugos strategijas, audit\u0105, apsaugos stiprinim\u0105 ir apsaugos \u012frankius, naudojamus atvirojo kodo aplinkose.<br><br><strong>Module 07<\/strong>: <strong>Endpoint Security \u2013 Mobile Devices<\/strong><br>Apima mobili\u0173j\u0173 platform\u0173 gynybos strategijas, \u012fskaitant \u012frengini\u0173 politik\u0105, saugi\u0105 konfig\u016bracij\u0105, mobili\u0173j\u0173 gr\u0117smi\u0173 vektorius ir \u012fmon\u0117s mobilumo valdym\u0105.<br><br><strong>Module 08<\/strong>: <strong>Endpoint Security \u2013 IoT Devices<\/strong><br>Aptaria su daikt\u0173 internetu susijusias rizikas ir apsaugos metodus, \u012fskaitant \u012frengini\u0173 autentifikavim\u0105, tinklo segmentavim\u0105, programin\u0117s \u012frangos apsaug\u0105 ir steb\u0117jim\u0105 aplinkoje, kurioje prijungti jutikliai ir prietaisai.<br><br><strong>Module 09<\/strong>: <strong>Administrative Application Security<\/strong><br>D\u0117mesys skiriamas program\u0173 valdymui ir apsaugai taikant saugaus k\u016brimo praktikas, pataisym\u0173 diegim\u0105, kodo per\u017ei\u016br\u0105, prieigos kontrol\u0119 ir pa\u017eeid\u017eiamum\u0173 tvarkym\u0105 program\u0173 lygmenyje.<br><br><strong>Module 10<\/strong>: <strong>Data Security<\/strong><br>Moko duomen\u0173 apsaugos metod\u0173, taikant klasifikavim\u0105, \u0161ifravim\u0105, prieigos politik\u0105, duomen\u0173 praradimo prevencij\u0105 (DLP) ir saugaus tvarkymo proced\u016bras per vis\u0105 duomen\u0173 gyvavimo cikl\u0105.<br><br><strong>Module 11<\/strong>: <strong>Enterprise Virtual Network Security<\/strong><br>Nagrin\u0117jami saugumo i\u0161\u0161\u016bkiai virtualizuotose aplinkose.<br><br><strong>Module 12<\/strong>: <strong>Enterprise Cloud Network Security<\/strong><br>Apima debesijos infrastrukt\u016bros gynyb\u0105 ir valdym\u0105 AWS, Azure ir GCP.<br><br><strong>Module 13<\/strong>: <strong>Enterprise Wireless Network Security<\/strong><br>Nagrin\u0117jami belaid\u017eio tinklo protokolai ir gr\u0117sm\u0117s, saugaus \u201eWi-Fi\u201c konfig\u016bravimo praktika (WPA3), neteis\u0117tos prieigos aptikimas ir priemon\u0117s, skirtos apsisaugoti nuo belaid\u017eio \u012fsilau\u017eimo bandym\u0173.<br><br><strong>Module 14<\/strong>: <strong>Network Traffic Monitoring and Analysis<\/strong><br>D\u0117mesys skiriamas tinklo srauto fiksavimui ir analizei naudojant tokias priemones kaip paket\u0173 \u0161nipin\u0117jimo \u012frankiai, IDS\/IPS \u017eurnalai, sraut\u0173 analiz\u0117 ir anomalij\u0173 aptikimas, siekiant aptikti kenk\u0117ji\u0161k\u0105 elges\u012f.<br><br><strong>Module 15<\/strong>: <strong>Network Logs Monitoring and Analysis<\/strong><br>Mokoma, kaip rinkti, normalizuoti, analizuoti ir reaguoti \u012f \u017eurnalus i\u0161 u\u017ekard\u0173, serveri\u0173, program\u0173 ir saugos \u012frengini\u0173, kaip gr\u0117smi\u0173 aptikimo ir atitikties steb\u0117jimo dal\u012f.<br><br><strong>Module 16<\/strong>: <strong>Incident Response and Forensic Investigation<\/strong><br>I\u0161samiai apra\u0161omi incident\u0173 tria\u017eo, izoliavimo, tyrimo, \u012frodym\u0173 rinkimo ir taisom\u0173j\u0173 veiksm\u0173 procesai, suteikiantys specialistams galimyb\u0119 veiksmingai reaguoti saugumo pa\u017eeidimo atveju.<br><br><strong>Module 17<\/strong>: <strong>Business Continuity and Disaster Recovery<\/strong><br>Apima strategijas, skirtas u\u017etikrinti veiklos t\u0119stinum\u0105 sistemos sutrikim\u0173 metu, \u012fskaitant atsargines kopijas, atk\u016brimo planavim\u0105, pertekli\u0173 ir atsparumo didinimo praktik\u0105.<br><br><strong>Module 18<\/strong>: <strong>Risk Anticipation with Risk Management<\/strong><br>Moko sistemingo rizikos identifikavimo, analiz\u0117s, vertinimo ir ma\u017einimo planavimo, siekiant suma\u017einti pa\u017eeid\u017eiamumus ir pasirengti b\u016bsimoms gr\u0117sm\u0117ms.<br><br><strong>Module 19<\/strong>: <strong>Threat Assessment with Attack Surface Analysis<\/strong><br>D\u0117mesys sutelkiamas \u012f organizacijos atak\u0173 pavir\u0161iaus vertinim\u0105, nustatant pa\u017eeid\u017eiamus i\u0161teklius, rizikas ir galimus patekimo ta\u0161kus, taip padedant nustatyti gynybini\u0173 investicij\u0173 ir testavimo prioritetus.<br><br><strong>Module 20<\/strong>: <strong>Threat Prediction with Cyber Threat Intelligence<\/strong><br>Nagrin\u0117jama, kaip naudoti gr\u0117smi\u0173 \u017evalgybos kanalus, kompromitavimo indikatorius (IOC), gr\u0117smi\u0173 paie\u0161k\u0105 ir nusp\u0117jam\u0105j\u0105 analiz\u0119, siekiant numatyti kylan\u010dias gr\u0117smes ir joms pasiruo\u0161ti dar prie\u0161 joms atsirandant.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-e8685c-62 inactive\" data-tab=\"3\">\n<div id=\"gspb_text-id-gsbp-38780e3\" class=\"gspb_text gspb_text-id-gsbp-38780e3\"><strong>SOC analitikas (Tier 1 \/ Tier 2)<\/strong><br>Stebi saugumo \u012fsp\u0117jimus, analizuoja \u017eurnalus, atlieka incident\u0173 pirmin\u012f vertinim\u0105 ir eskaluoja gr\u0117smes.<br><br><strong>Tinklo saugumo analitikas<\/strong><br>Secure network infrastructure, monitor traffic, and manage firewalls and IDS\/IPS.<br><br><strong>Kibernetinio gynybos analitikas (Cyber Defense Analyst)<\/strong><br>Aptinka ir reaguoja \u012f kibernetines atakas.<br><br><strong>Incident\u0173 reagavimo analitikas (Incident Response Analyst)<\/strong><br>Palaiko incident\u0173 suvaldym\u0105, gr\u0117smi\u0173 pa\u0161alinim\u0105 ir sistem\u0173 atk\u016brim\u0105 saugumo incident\u0173 metu.<br><br><strong>Saugumo operacij\u0173 specialistas (Security Operations Specialist)<\/strong><br>Pri\u017ei\u016bri ir palaiko kasdienes SOC operacijas.<br><br><strong>Jaunesnysis m\u0117lynosios komandos analitikas (Junior Blue Team Analyst)<\/strong><br>Stiprina gynyb\u0105 ir padeda vykdyti gr\u0117smi\u0173 paie\u0161k\u0105 (threat hunting).<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-gutena-tab gutena-tab-block gutena-tab-block-f47fbe-8c inactive\" data-tab=\"4\">\n<div id=\"gspb_text-id-gsbp-4883c85\" class=\"gspb_text gspb_text-id-gsbp-4883c85\"><strong>Egzamino formatas<\/strong><br>Pateikiamas klausimas ir keli galimi atsakymo variantai.<br><br><strong>Klausim\u0173 kiekis<\/strong><br>100<br><br><strong>Trukm\u0117<\/strong><br>4 valandos<br><br><strong>Egzaminas vykdomas<\/strong><br>Nuotoliu per ECC portal\u0105<br><br><strong>I\u0161laikymo balas<\/strong><br>70% to 85%<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n <\/div><\/div>\n\n\n\n<div class=\"gspb_button_wrapper gspb_button-id-gsbp-dc2dd20\" id=\"gspb_button-id-gsbp-dc2dd20\"><a class=\"wp-block-greenshift-blocks-buttonbox gspb-buttonbox wp-element-button\" href=\"https:\/\/sauguskodas.lt\/lt\/contact\/\" rel=\"noopener\"><span class=\"gspb-buttonbox-textwrap\"><span class=\"gspb-buttonbox-text\"><span class=\"gspb-buttonbox-title\">Become A CERTIFIED Network defender<\/span><\/span><span class=\"gspb-buttonbox-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" style=\"width:5rem;height:5rem;margin:10px\" viewbox=\"0 0 24 24\"><path fill-rule=\"evenodd\" d=\"M24 0v22.78h-2.87V4.9L2.03 24 0 21.97l19.1-19.1H1.26V0H24Z\"><\/path><\/svg><\/span><\/span><\/a><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_gspb_post_css":"#gspb_row-id-gsbp-8cad913{justify-content:space-between;margin-top:0;display:flex;flex-wrap:wrap;margin-bottom:0;padding:0 80px}#gspb_row-id-gsbp-8cad913>.gspb_row__content{display:flex;justify-content:space-between;margin:0 auto;width:100%;flex-wrap:wrap}.gspb_row{position:relative}div[id^=gspb_col-id]{box-sizing:border-box;position:relative;padding:var(--gs-row-column-padding, 15px min(3vw, 20px))}@media (max-width:991.98px){#gspb_row-id-gsbp-8cad913>.gspb_row__content{row-gap:30px}}@media (max-width:991.98px){#gspb_row-id-gsbp-8cad913{margin-bottom:24px;padding-right:50px;padding-left:50px}}@media (max-width:575.98px){#gspb_row-id-gsbp-8cad913{margin-bottom:32px;padding-right:35px;padding-left:35px}}#gspb_row-id-gsbp-8cad913{min-height:300px}@media (max-width:575.98px){#gspb_row-id-gsbp-8cad913{min-height:100px}}#gspb_row-id-gsbp-8cad913{box-shadow:0 2px 4px 0 rgba(0,0,0,.07);background-color:var(--wp--preset--color--palette-color-7, var(--theme-palette-color-7, #F7FAFD))}#gspb_row-id-gsbp-8cad913,#gspb_row-id-gsbp-8cad913>.gspb_backgroundOverlay{border-top-left-radius:20px;border-top-right-radius:20px;border-bottom-right-radius:20px;border-bottom-left-radius:20px}#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:calc(75% - 5px)}@media (max-width:991.98px){#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:100%}}@media (max-width:767.98px){#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:calc(100% - 5px)}}@media (max-width:575.98px){#gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{width:100%}}.gspb_row #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{margin-top:0;margin-right:0;margin-left:0;padding:70px 0}@media (max-width:991.98px){.gspb_row #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{padding-top:50px;padding-bottom:0}}@media (max-width:575.98px){.gspb_row #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{padding-bottom:0}}body #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{display:flex;flex-direction:column;justify-content:center}@media (max-width:991.98px){body #gspb_col-id-gsbp-6a3bc96.gspb_row__col--9{align-items:center}#gspb_heading-id-gsbp-d302bf1,#gspb_heading-id-gsbp-d302bf1 .gsap-g-line{text-align:center!important}}#gspb_heading-id-gsbp-d302bf1{margin-top:0;margin-bottom:0}@media (max-width:991.98px){#gspb_heading-id-gsbp-d302bf1{margin-bottom:42px}}@media (max-width:575.98px){#gspb_heading-id-gsbp-d302bf1{margin-bottom:40px}}#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:calc(25% - 25px)}@media (max-width:991.98px){#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:100%}}@media (max-width:767.98px){#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:calc(100% - 25px)}}@media (max-width:575.98px){#gspb_col-id-gsbp-ae00069.gspb_row__col--3{width:100%}}.gspb_row #gspb_col-id-gsbp-ae00069.gspb_row__col--3{padding:0}#gspb_col-id-gsbp-ae00069.gspb_row__col--3{transition:all .5s cubic-bezier(.42,0,.58,1);transform:translateY(0);transform-origin:center center}body #gspb_col-id-gsbp-ae00069.gspb_row__col--3{display:flex;flex-direction:column;justify-content:flex-end;align-items:center}#gspb_row-id-gsbp-cac37db{justify-content:space-between;margin-bottom:0;display:flex;flex-wrap:wrap;margin-top:80px}#gspb_row-id-gsbp-cac37db>.gspb_row__content{display:flex;justify-content:space-between;margin:0 auto;width:100%;flex-wrap:wrap}body.gspb-bodyfront #gspb_row-id-gsbp-8cad913>.gspb_row__content,body.gspb-bodyfront #gspb_row-id-gsbp-cac37db>.gspb_row__content{width:var(--theme-container-width, 1200px);max-width:var(--theme-normal-container-max-width, 1200px)}@media (max-width:575.98px){#gspb_row-id-gsbp-cac37db{margin-top:20px}}#gspb_col-id-gsbp-df5e025.gspb_row__col--12{width:100%}@media (max-width:575.98px){#gspb_col-id-gsbp-df5e025.gspb_row__col--12{width:100%}}.gspb_row #gspb_col-id-gsbp-df5e025.gspb_row__col--12{padding-right:0;padding-left:0}.gspb_text-id-gsbp-e1466bf{font-size:18px}@media (max-width:575.98px){.gspb_text-id-gsbp-e1466bf{font-size:16px}}.gspb_text-id-gsbp-e1466bf{margin-bottom:15px!important}@media (max-width:991.98px){.gspb_text-id-gsbp-e1466bf{margin-top:0!important}}@media (max-width:575.98px){.gspb_text-id-gsbp-e1466bf{margin-right:0!important;margin-left:0!important}}.gspb_text-id-gsbp-4883c85{margin-bottom:0!important}#gspb_button-id-gsbp-dc2dd20{display:flex;justify-content:flex-start}#gspb_button-id-gsbp-dc2dd20 .gspb-buttonbox-text{display:flex;flex-direction:column}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox{box-sizing:border-box}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox>.gspb-buttonbox-textwrap>.gspb-buttonbox-icon{display:flex}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox .gspb-buttonbox-icon svg{height:13px!important;width:13px!important;min-width:13px!important;fill:currentColor!important;margin:0!important}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox .gspb-buttonbox-icon svg path{fill:currentColor!important}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox>.gspb-buttonbox-textwrap{display:flex;flex-direction:row;align-items:center}#gspb_button-id-gsbp-dc2dd20 .gspb-buttonbox-icon{margin-left:13px}#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox{margin-top:40px;margin-bottom:40px}@media (max-width:575.98px){#gspb_button-id-gsbp-dc2dd20>.gspb-buttonbox{margin-top:44px}}","footnotes":""},"class_list":["post-1055","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6},"vertical_spacing_source":"custom","content_area_spacing":"bottom"},"_links":{"self":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages\/1055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/comments?post=1055"}],"version-history":[{"count":19,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages\/1055\/revisions"}],"predecessor-version":[{"id":1219,"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/pages\/1055\/revisions\/1219"}],"wp:attachment":[{"href":"https:\/\/sauguskodas.lt\/lt\/wp-json\/wp\/v2\/media?parent=1055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}