{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/g0H6bPtj8URuM243VeOY/FBZPGZX7OAMjYkMUJ5oz/siteMetadata.js"],
  "sourcesContent": ["// Generated by Framer (f26e712)\nexport default function metadata(params,activeLocale){return{customHTMLBodyStart:'<!-- Google Tag Manager (noscript) -->\\n<noscript><iframe src=\"https://www.googletagmanager.com/ns.html?id=GTM-5WH5XVJ2\" height=\"0\" width=\"0\" style=\"display:none;visibility:hidden\"></iframe></noscript>\\n<!-- End Google Tag Manager (noscript) -->',customHTMLHeadStart:\"<!-- Google Tag Manager -->\\n<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\\nnew Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\\nj=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\\n'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\\n})(window,document,'script','dataLayer','GTM-5WH5XVJ2');</script>\\n<!-- End Google Tag Manager -->\",description:\"Threat-informed cybersecurity training. Expert-led courses in OT cybersecurity, counter-adversary tactics, and leadership. Learn SCADA security, red team operations, deception, and resilience.\",favicon:\"https://framerusercontent.com/assets/HAALo98bRtgVxJ1EOJshpxivx1k.png\",robots:\"max-image-preview:large\",socialImage:\"https://framerusercontent.com/assets/IaUtQsnMPlDrCESBgGF411O2Q0.png\",title:\"Cyber Toolbox\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,oBAAoB;AAAA;AAAA,4CAAwP,oBAAoB;AAAA;AAAA;AAAA;AAAA;AAAA;AAAA,iCAA4a,YAAY,mMAAmM,QAAQ,uEAAuE,OAAO,0BAA0B,YAAY,sEAAsE,MAAM,eAAe,CAAE",
  "names": ["metadata", "params", "activeLocale"]
}
