
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.

Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.

Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- CEH | Introduction of CEH | 9th Oct (69:06)
- CEH | Attacking framework | 11th Oct (71:13)
- CEH | Cybersecurity attacks | 12th Oct (67:35)
- CEH | Linux fundamentals | 13th Oct (67:29)
- CEH | Basics of hacking | 17th Oct (73:08)
- CEH | Google Dorking | 18th Oct (73:16)
- CEH | Information gathering | 19th Oct (78:18)
- CEH | Footprinting | 20th Oct (73:58)
- CEH | Scanning | 25th Oct (86:19)
- CEH | System hacking | 26th Oct (95:40)
- CEH | Nmap | 30th Oct (77:50)
- CEH | Nmap | 31st Oct (68:25)
- CEH | Nmap script engine | 1st Nov (79:33)
- CEH | Nse categories | 2nd Nov (84:16)
- CEH | System hacking | 3rd Nov (100:23)
- CEH | System Reconnisance | 8th Nov (66:58)
- CEH | 9th Nov (71:58)
- CEH | 10th Nov (46:38)
- CEH | 13th Nov (57:35)
- CEH | System hacking (troll) | 14th Nov (75:07)
- CEH | Windows hacking | 15th Nov (67:59)
- CEH | Malware |20th Nov (76:59)
- CEH | Social engineering and vulnerability assessment | 21th Nov (84:11)
- CEH | 22nd Nov (75:04)
- CEH | Vulnerability assessment |24th Nov (98:02)
- CEH | Dos Attack | 28th Nov (80:56)
- CEH | Web application attack | 4th Dec (95:08)
- CEH | Web application attack - 2 | 5th Dec (90:54)
- CEH | Web application attack part 3 | 6th Dec (87:28)
- CEH | Web application attack 4 | 7th Dec (91:42)
- CEH | Web Application Attack | 8th Dec (93:33)
- CEH | machine walkthrough | 11th Dec (72:31)
- CEH | Ids/ips/firewall | 12th Dec (100:13)
- CEH | machine walkthrough | 13th Dec (50:58)
- CEH | hackademic walkthrough | 18th Oct (61:39)
- CEH | encryption |19th Dec (61:39)
- CEH | pki |21st Dec (69:19)
- CEH | mobile platform | 22th Dec (61:27)
- CEH | Walkthrough hackademic 2 | 26th Dec (86:23)
- CEH | Cloud computing | 27th Dec (61:26)
- CEH | 29th Dec (59:21)
- CEH | Wireless Network | 1st Jan (58:09)
- CEH | Wireless | 3rd Jan (66:05)
- CEH | Wireless | 4th Jan (62:36)
- CEH | 5th Jan (70:13)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.

Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.