Compare commits
3 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| a7ea20efb2 | |||
| 479eae146d | |||
| 8882efd786 |
@@ -7,48 +7,33 @@ import { ServiceWrapper } from "@/components/ServiceWrapper";
|
|||||||
import Tag from "@/tag/Tag";
|
import Tag from "@/tag/Tag";
|
||||||
|
|
||||||
const halant = Halant({
|
const halant = Halant({
|
||||||
variable: "--font-halant",
|
variable: "--font-halant", subsets: ["latin"],
|
||||||
subsets: ["latin"],
|
|
||||||
weight: ["300", "400", "500", "600", "700"],
|
weight: ["300", "400", "500", "600", "700"],
|
||||||
});
|
});
|
||||||
|
|
||||||
const inter = Inter({
|
const inter = Inter({
|
||||||
variable: "--font-inter",
|
variable: "--font-inter", subsets: ["latin"],
|
||||||
subsets: ["latin"],
|
|
||||||
});
|
});
|
||||||
|
|
||||||
const poppins = Poppins({
|
const poppins = Poppins({
|
||||||
variable: "--font-poppins",
|
variable: "--font-poppins", subsets: ["latin"],
|
||||||
subsets: ["latin"],
|
|
||||||
weight: ["100", "200", "300", "400", "500", "600", "700", "800", "900"],
|
weight: ["100", "200", "300", "400", "500", "600", "700", "800", "900"],
|
||||||
});
|
});
|
||||||
|
|
||||||
export const metadata: Metadata = {
|
export const metadata: Metadata = {
|
||||||
title: "Black Hat Ethical Hacking - Expert Penetration Testing & Security Training",
|
title: "Black Hat Ethical Hacking - Expert Penetration Testing & Security Training", description: "BHEH provides professional penetration testing, vulnerability assessments, advanced security courses, and elite community access. Learn vulnerabilities before attackers do.", keywords: "penetration testing, ethical hacking, vulnerability assessment, security training, red team, offensive security, cybersecurity", metadataBase: new URL("https://blackhatethicalhacking.com"),
|
||||||
description: "BHEH provides professional penetration testing, vulnerability assessments, advanced security courses, and elite community access. Learn vulnerabilities before attackers do.",
|
|
||||||
keywords: "penetration testing, ethical hacking, vulnerability assessment, security training, red team, offensive security, cybersecurity",
|
|
||||||
metadataBase: new URL("https://blackhatethicalhacking.com"),
|
|
||||||
alternates: {
|
alternates: {
|
||||||
canonical: "https://blackhatethicalhacking.com"
|
canonical: "https://blackhatethicalhacking.com"
|
||||||
},
|
},
|
||||||
openGraph: {
|
openGraph: {
|
||||||
title: "Black Hat Ethical Hacking - Offensive Security Expertise",
|
title: "Black Hat Ethical Hacking - Offensive Security Expertise", description: "Expert penetration testing, vulnerability assessments, and advanced security training for enterprises and professionals.", url: "https://blackhatethicalhacking.com", siteName: "Black Hat Ethical Hacking", type: "website", images: [
|
||||||
description: "Expert penetration testing, vulnerability assessments, and advanced security training for enterprises and professionals.",
|
|
||||||
url: "https://blackhatethicalhacking.com",
|
|
||||||
siteName: "Black Hat Ethical Hacking",
|
|
||||||
type: "website",
|
|
||||||
images: [
|
|
||||||
{
|
{
|
||||||
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png",
|
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", alt: "Black Hat Ethical Hacking - Security Operations Center"
|
||||||
alt: "Black Hat Ethical Hacking - Security Operations Center"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
twitter: {
|
twitter: {
|
||||||
card: "summary_large_image",
|
card: "summary_large_image", title: "Black Hat Ethical Hacking - Penetration Testing & Security Training", description: "Learn vulnerabilities before attackers do. Expert offensive security services.", images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png"]
|
||||||
title: "Black Hat Ethical Hacking - Penetration Testing & Security Training",
|
|
||||||
description: "Learn vulnerabilities before attackers do. Expert offensive security services.",
|
|
||||||
images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png"]
|
|
||||||
},
|
},
|
||||||
robots: {
|
robots: {
|
||||||
index: true,
|
index: true,
|
||||||
@@ -1440,4 +1425,4 @@ export default function RootLayout({
|
|||||||
</ServiceWrapper>
|
</ServiceWrapper>
|
||||||
</html>
|
</html>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|||||||
204
src/app/page.tsx
204
src/app/page.tsx
@@ -48,9 +48,7 @@ export default function HomePage() {
|
|||||||
{ name: "Resources", id: "resources" },
|
{ name: "Resources", id: "resources" },
|
||||||
]}
|
]}
|
||||||
button={{
|
button={{
|
||||||
text: "Explore Solutions",
|
text: "Explore Solutions", href: "/services"}}
|
||||||
href: "/services",
|
|
||||||
}}
|
|
||||||
animateOnLoad={true}
|
animateOnLoad={true}
|
||||||
/>
|
/>
|
||||||
</div>
|
</div>
|
||||||
@@ -66,21 +64,15 @@ export default function HomePage() {
|
|||||||
slides={[
|
slides={[
|
||||||
{
|
{
|
||||||
imageSrc:
|
imageSrc:
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", imageAlt:
|
||||||
imageAlt:
|
"Security operations center with offensive security controls"},
|
||||||
"Security operations center with offensive security controls",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
imageSrc:
|
imageSrc:
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/abstract-digital-network-attack-visualiz-1772665231232-0dbf7641.png",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/abstract-digital-network-attack-visualiz-1772665231232-0dbf7641.png", imageAlt: "Network attack visualization and threat pathways"},
|
||||||
imageAlt: "Network attack visualization and threat pathways",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
imageSrc:
|
imageSrc:
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-red-team-operatives-in-a-mo-1772665230961-f5b84058.png",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-red-team-operatives-in-a-mo-1772665230961-f5b84058.png", imageAlt:
|
||||||
imageAlt:
|
"Red team operations and security assessments"},
|
||||||
"Red team operations and security assessments",
|
|
||||||
},
|
|
||||||
]}
|
]}
|
||||||
autoplayDelay={4000}
|
autoplayDelay={4000}
|
||||||
showDimOverlay={true}
|
showDimOverlay={true}
|
||||||
@@ -95,14 +87,10 @@ export default function HomePage() {
|
|||||||
{ icon: Target, label: "Critical Tests Delivered", value: "500+" },
|
{ icon: Target, label: "Critical Tests Delivered", value: "500+" },
|
||||||
{
|
{
|
||||||
icon: Users,
|
icon: Users,
|
||||||
label: "Security Professionals",
|
label: "Security Professionals", value: "2,500+"},
|
||||||
value: "2,500+",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
icon: Globe,
|
icon: Globe,
|
||||||
label: "Enterprise Clients Secured",
|
label: "Enterprise Clients Secured", value: "200+"},
|
||||||
value: "200+",
|
|
||||||
},
|
|
||||||
]}
|
]}
|
||||||
metricsAnimation="slide-up"
|
metricsAnimation="slide-up"
|
||||||
useInvertedBackground={false}
|
useInvertedBackground={false}
|
||||||
@@ -117,29 +105,17 @@ export default function HomePage() {
|
|||||||
tagIcon={Zap}
|
tagIcon={Zap}
|
||||||
features={[
|
features={[
|
||||||
{
|
{
|
||||||
title: "Penetration Testing Services",
|
title: "Penetration Testing Services", description:
|
||||||
description:
|
"Expert manual security assessments targeting real-world attack vectors and business-critical systems.", bentoComponent: "globe"},
|
||||||
"Expert manual security assessments targeting real-world attack vectors and business-critical systems.",
|
|
||||||
bentoComponent: "globe",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
title: "Vulnerability Management",
|
title: "Vulnerability Management", description:
|
||||||
description:
|
"Comprehensive vulnerability discovery and prioritization with actionable remediation guidance.", bentoComponent: "animated-bar-chart"},
|
||||||
"Comprehensive vulnerability discovery and prioritization with actionable remediation guidance.",
|
|
||||||
bentoComponent: "animated-bar-chart",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
title: "Red Team Operations",
|
title: "Red Team Operations", description:
|
||||||
description:
|
"Advanced adversary simulations and multi-phase engagement scenarios.", bentoComponent: "map"},
|
||||||
"Advanced adversary simulations and multi-phase engagement scenarios.",
|
|
||||||
bentoComponent: "map",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
title: "Exploit Development",
|
title: "Exploit Development", description:
|
||||||
description:
|
"Zero-day research and advanced exploitation technique training.", bentoComponent: "line-chart"},
|
||||||
"Zero-day research and advanced exploitation technique training.",
|
|
||||||
bentoComponent: "line-chart",
|
|
||||||
},
|
|
||||||
]}
|
]}
|
||||||
textboxLayout="default"
|
textboxLayout="default"
|
||||||
animationType="slide-up"
|
animationType="slide-up"
|
||||||
@@ -155,83 +131,44 @@ export default function HomePage() {
|
|||||||
tagIcon={DollarSign}
|
tagIcon={DollarSign}
|
||||||
plans={[
|
plans={[
|
||||||
{
|
{
|
||||||
id: "assessment",
|
id: "assessment", badge: "Vulnerability Assessment", badgeIcon: Search,
|
||||||
badge: "Vulnerability Assessment",
|
price: "Custom Pricing", subtitle:
|
||||||
badgeIcon: Search,
|
"Ideal for SMBs seeking foundational security insights", buttons: [
|
||||||
price: "Custom Pricing",
|
|
||||||
subtitle:
|
|
||||||
"Ideal for SMBs seeking foundational security insights",
|
|
||||||
buttons: [
|
|
||||||
{ text: "Request Quote", href: "/contact" },
|
{ text: "Request Quote", href: "/contact" },
|
||||||
{ text: "Learn More", href: "#" },
|
{ text: "Learn More", href: "#" },
|
||||||
],
|
],
|
||||||
features: [
|
features: [
|
||||||
"Scope Definition & Reconnaissance",
|
"Scope Definition & Reconnaissance", "Active Vulnerability Scanning", "Manual Testing of High-Risk Areas", "Detailed Assessment Report", "Remediation Roadmap"],
|
||||||
"Active Vulnerability Scanning",
|
|
||||||
"Manual Testing of High-Risk Areas",
|
|
||||||
"Detailed Assessment Report",
|
|
||||||
"Remediation Roadmap",
|
|
||||||
],
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "pentest",
|
id: "pentest", badge: "Full Penetration Test", badgeIcon: Target,
|
||||||
badge: "Full Penetration Test",
|
price: "Custom Pricing", subtitle:
|
||||||
badgeIcon: Target,
|
"Enterprise-grade comprehensive testing with detailed exploitation analysis", buttons: [
|
||||||
price: "Custom Pricing",
|
|
||||||
subtitle:
|
|
||||||
"Enterprise-grade comprehensive testing with detailed exploitation analysis",
|
|
||||||
buttons: [
|
|
||||||
{ text: "Request Quote", href: "/contact" },
|
{ text: "Request Quote", href: "/contact" },
|
||||||
{ text: "Learn More", href: "#" },
|
{ text: "Learn More", href: "#" },
|
||||||
],
|
],
|
||||||
features: [
|
features: [
|
||||||
"Multi-Phase Attack Simulation",
|
"Multi-Phase Attack Simulation", "Network & Application Testing", "Credential Compromise Scenarios", "Post-Exploitation Analysis", "Executive Summary + Technical Report", "Remediation Consultation"],
|
||||||
"Network & Application Testing",
|
|
||||||
"Credential Compromise Scenarios",
|
|
||||||
"Post-Exploitation Analysis",
|
|
||||||
"Executive Summary + Technical Report",
|
|
||||||
"Remediation Consultation",
|
|
||||||
],
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "elite",
|
id: "elite", badge: "Elite Membership", badgeIcon: Crown,
|
||||||
badge: "Elite Membership",
|
price: "$299/mo", subtitle:
|
||||||
badgeIcon: Crown,
|
"Exclusive access to advanced training, community, and weekly intelligence briefings", buttons: [
|
||||||
price: "$299/mo",
|
|
||||||
subtitle:
|
|
||||||
"Exclusive access to advanced training, community, and weekly intelligence briefings",
|
|
||||||
buttons: [
|
|
||||||
{ text: "Join Elite", href: "#" },
|
{ text: "Join Elite", href: "#" },
|
||||||
{ text: "30-Day Free Trial", href: "#" },
|
{ text: "30-Day Free Trial", href: "#" },
|
||||||
],
|
],
|
||||||
features: [
|
features: [
|
||||||
"Advanced Security Courses",
|
"Trusted by 500+ Security Professionals", "Advanced Security Courses", "Private Exploit Intelligence", "Weekly Deep-Dive Briefings", "Exclusive Community Access", "1-on-1 Expert Consultation", "CVE Research & Analysis Library"],
|
||||||
"Private Exploit Intelligence",
|
|
||||||
"Weekly Deep-Dive Briefings",
|
|
||||||
"Exclusive Community Access",
|
|
||||||
"1-on-1 Expert Consultation",
|
|
||||||
"CVE Research & Analysis Library",
|
|
||||||
],
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
id: "course",
|
id: "course", badge: "Professional Courses", badgeIcon: BookOpen,
|
||||||
badge: "Professional Courses",
|
price: "$99-$499", subtitle:
|
||||||
badgeIcon: BookOpen,
|
"Self-paced advanced security education with hands-on labs and certifications", buttons: [
|
||||||
price: "$99-$499",
|
|
||||||
subtitle:
|
|
||||||
"Self-paced advanced security education with hands-on labs and certifications",
|
|
||||||
buttons: [
|
|
||||||
{ text: "Browse Courses", href: "#" },
|
{ text: "Browse Courses", href: "#" },
|
||||||
{ text: "View Schedule", href: "#" },
|
{ text: "View Schedule", href: "#" },
|
||||||
],
|
],
|
||||||
features: [
|
features: [
|
||||||
"Real-World CVE Studies",
|
"Real-World CVE Studies", "Hands-On Lab Environments", "Advanced TTP Techniques", "Community Support", "Certificate of Completion", "Lifetime Access to Course Materials"],
|
||||||
"Hands-On Lab Environments",
|
|
||||||
"Advanced TTP Techniques",
|
|
||||||
"Community Support",
|
|
||||||
"Certificate of Completion",
|
|
||||||
"Lifetime Access to Course Materials",
|
|
||||||
],
|
|
||||||
},
|
},
|
||||||
]}
|
]}
|
||||||
animationType="slide-up"
|
animationType="slide-up"
|
||||||
@@ -248,23 +185,9 @@ export default function HomePage() {
|
|||||||
textboxLayout="default"
|
textboxLayout="default"
|
||||||
useInvertedBackground={false}
|
useInvertedBackground={false}
|
||||||
names={[
|
names={[
|
||||||
"Fortune 500 Enterprises",
|
"Fortune 500 Enterprises", "Government Agencies", "Financial Institutions", "Healthcare Organizations", "Technology Companies", "Defense Contractors"]}
|
||||||
"Government Agencies",
|
|
||||||
"Financial Institutions",
|
|
||||||
"Healthcare Organizations",
|
|
||||||
"Technology Companies",
|
|
||||||
"Defense Contractors",
|
|
||||||
]}
|
|
||||||
logos={[
|
logos={[
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/microsoft-corporate-logo-in-professional-1772665230899-72ad699d.png",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/microsoft-corporate-logo-in-professional-1772665230899-72ad699d.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/google-corporate-logo-in-professional-st-1772665229491-3cdaa423.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/amazon-corporate-logo-in-professional-st-1772665231165-9d534d99.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/cisco-corporate-logo-in-professional-sty-1772665230232-607a1c38.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/ibm-corporate-logo-in-professional-style-1772665229572-4fde208b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/oracle-corporate-logo-in-professional-st-1772665230272-2e3bf981.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/vmware-corporate-logo-in-professional-st-1772665230936-471a9b59.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/crowdstrike-corporate-logo-in-profession-1772665230593-feebe9c2.png"]}
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/google-corporate-logo-in-professional-st-1772665229491-3cdaa423.png",
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/amazon-corporate-logo-in-professional-st-1772665231165-9d534d99.png",
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/cisco-corporate-logo-in-professional-sty-1772665230232-607a1c38.png",
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/ibm-corporate-logo-in-professional-style-1772665229572-4fde208b.png",
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/oracle-corporate-logo-in-professional-st-1772665230272-2e3bf981.png",
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/vmware-corporate-logo-in-professional-st-1772665230936-471a9b59.png",
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/crowdstrike-corporate-logo-in-profession-1772665230593-feebe9c2.png",
|
|
||||||
]}
|
|
||||||
speed={40}
|
speed={40}
|
||||||
showCard={true}
|
showCard={true}
|
||||||
/>
|
/>
|
||||||
@@ -274,47 +197,23 @@ export default function HomePage() {
|
|||||||
<TestimonialCardTwelve
|
<TestimonialCardTwelve
|
||||||
testimonials={[
|
testimonials={[
|
||||||
{
|
{
|
||||||
id: "1",
|
id: "1", name: "Michael Rodriguez", imageSrc:
|
||||||
name: "Michael Rodriguez",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-ciso-or-secur-1772665230699-34f24f43.png", imageAlt: "Michael Rodriguez, CISO"},
|
||||||
imageSrc:
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-ciso-or-secur-1772665230699-34f24f43.png",
|
|
||||||
imageAlt: "Michael Rodriguez, CISO",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
id: "2",
|
id: "2", name: "Jennifer Lee", imageSrc:
|
||||||
name: "Jennifer Lee",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230258-822d603e.png", imageAlt: "Jennifer Lee, Security Director"},
|
||||||
imageSrc:
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230258-822d603e.png",
|
|
||||||
imageAlt: "Jennifer Lee, Security Director",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
id: "3",
|
id: "3", name: "David Kim", imageSrc:
|
||||||
name: "David Kim",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-male-security-1772665230880-391c8105.png", imageAlt: "David Kim, Security Consultant"},
|
||||||
imageSrc:
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-male-security-1772665230880-391c8105.png",
|
|
||||||
imageAlt: "David Kim, Security Consultant",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
id: "4",
|
id: "4", name: "Rebecca Patel", imageSrc:
|
||||||
name: "Rebecca Patel",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-penetr-1772665230579-27fed186.png", imageAlt: "Rebecca Patel, Red Team Lead"},
|
||||||
imageSrc:
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-penetr-1772665230579-27fed186.png",
|
|
||||||
imageAlt: "Rebecca Patel, Red Team Lead",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
id: "5",
|
id: "5", name: "Thomas Anderson", imageSrc:
|
||||||
name: "Thomas Anderson",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-security-oper-1772665230399-cd58b901.png", imageAlt: "Thomas Anderson, Security Manager"},
|
||||||
imageSrc:
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-security-oper-1772665230399-cd58b901.png",
|
|
||||||
imageAlt: "Thomas Anderson, Security Manager",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
id: "6",
|
id: "6", name: "Victoria Chen", imageSrc:
|
||||||
name: "Victoria Chen",
|
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230542-1aed583e.png", imageAlt: "Victoria Chen, CISO"},
|
||||||
imageSrc:
|
|
||||||
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230542-1aed583e.png",
|
|
||||||
imageAlt: "Victoria Chen, CISO",
|
|
||||||
},
|
|
||||||
]}
|
]}
|
||||||
cardTitle="Trusted by 2,500+ Security Professionals and 200+ Enterprise Organizations Worldwide"
|
cardTitle="Trusted by 2,500+ Security Professionals and 200+ Enterprise Organizations Worldwide"
|
||||||
cardTag="Industry Leaders in Offensive Security"
|
cardTag="Industry Leaders in Offensive Security"
|
||||||
@@ -327,8 +226,7 @@ export default function HomePage() {
|
|||||||
<FooterBaseReveal
|
<FooterBaseReveal
|
||||||
columns={[
|
columns={[
|
||||||
{
|
{
|
||||||
title: "Solutions",
|
title: "Solutions", items: [
|
||||||
items: [
|
|
||||||
{ label: "Penetration Testing", href: "/services" },
|
{ label: "Penetration Testing", href: "/services" },
|
||||||
{ label: "Vulnerability Assessment", href: "/services" },
|
{ label: "Vulnerability Assessment", href: "/services" },
|
||||||
{ label: "Red Team Services", href: "/services" },
|
{ label: "Red Team Services", href: "/services" },
|
||||||
@@ -336,8 +234,7 @@ export default function HomePage() {
|
|||||||
],
|
],
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
title: "Training & Community",
|
title: "Training & Community", items: [
|
||||||
items: [
|
|
||||||
{ label: "Security Courses", href: "/training" },
|
{ label: "Security Courses", href: "/training" },
|
||||||
{ label: "Elite Membership", href: "#pricing" },
|
{ label: "Elite Membership", href: "#pricing" },
|
||||||
{ label: "Community Forum", href: "#" },
|
{ label: "Community Forum", href: "#" },
|
||||||
@@ -345,8 +242,7 @@ export default function HomePage() {
|
|||||||
],
|
],
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
title: "Company",
|
title: "Company", items: [
|
||||||
items: [
|
|
||||||
{ label: "About BHEH", href: "#" },
|
{ label: "About BHEH", href: "#" },
|
||||||
{ label: "Blog & Research", href: "#" },
|
{ label: "Blog & Research", href: "#" },
|
||||||
{ label: "Contact", href: "/contact" },
|
{ label: "Contact", href: "/contact" },
|
||||||
@@ -359,4 +255,4 @@ export default function HomePage() {
|
|||||||
</div>
|
</div>
|
||||||
</ThemeProvider>
|
</ThemeProvider>
|
||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -10,15 +10,15 @@
|
|||||||
--accent: #ffffff;
|
--accent: #ffffff;
|
||||||
--background-accent: #ffffff; */
|
--background-accent: #ffffff; */
|
||||||
|
|
||||||
--background: #efebe5;
|
--background: #ffffff;
|
||||||
--card: #f7f2ea;
|
--card: #f9f9f9;
|
||||||
--foreground: #000000;
|
--foreground: #000f06e6;
|
||||||
--primary-cta: #000000;
|
--primary-cta: #0a7039;
|
||||||
--primary-cta-text: #efebe5;
|
--primary-cta-text: #ffffff;
|
||||||
--secondary-cta: #ffffff;
|
--secondary-cta: #f9f9f9;
|
||||||
--secondary-cta-text: #000000;
|
--secondary-cta-text: #000f06e6;
|
||||||
--accent: #ffffff;
|
--accent: #e2e2e2;
|
||||||
--background-accent: #e1b875;
|
--background-accent: #c4c4c4;
|
||||||
|
|
||||||
/* text sizing - set by ThemeProvider */
|
/* text sizing - set by ThemeProvider */
|
||||||
/* --text-2xs: clamp(0.465rem, 0.62vw, 0.62rem);
|
/* --text-2xs: clamp(0.465rem, 0.62vw, 0.62rem);
|
||||||
|
|||||||
Reference in New Issue
Block a user