Compare commits
8 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 9eb0c04a70 | |||
| f40b7d6c7f | |||
| d144c93ea0 | |||
| 210a1e3b9c | |||
| d3ad599581 | |||
| 578511cceb | |||
| bdb3d8bd3d | |||
| 03a3371fc8 |
@@ -52,7 +52,7 @@ export default function LandingPage() {
|
|||||||
tagIcon={Shield}
|
tagIcon={Shield}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
buttons={[
|
buttons={[
|
||||||
{ text: "Start Here", href: "lessons" },
|
{ text: "Begin Free Lesson", href: "lessons" },
|
||||||
{ text: "Learn More", href: "about" }
|
{ text: "Learn More", href: "about" }
|
||||||
]}
|
]}
|
||||||
buttonAnimation="slide-up"
|
buttonAnimation="slide-up"
|
||||||
@@ -84,14 +84,14 @@ export default function LandingPage() {
|
|||||||
tagIcon={BookOpen}
|
tagIcon={BookOpen}
|
||||||
tagAnimation="slide-up"
|
tagAnimation="slide-up"
|
||||||
products={[
|
products={[
|
||||||
{ id: "1", name: "Email Scams", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-vector/steal-data-concept-illustrated_23-2148542545.jpg?_wi=2", imageAlt: "Email scams warning" },
|
{ id: "1", name: "Email Scams", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/steal-data-concept-illustrated_23-2148542545.jpg?_wi=2", imageAlt: "Email scams warning" },
|
||||||
{ id: "2", name: "Phone Scams", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-photo/closeup-businessman-using-mobile-phone-video-call-from-office_637285-10972.jpg?_wi=2", imageAlt: "Phone scams alert" },
|
{ id: "2", name: "Phone Scams", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/closeup-businessman-using-mobile-phone-video-call-from-office_637285-10972.jpg?_wi=2", imageAlt: "Phone scams alert" },
|
||||||
{ id: "3", name: "Social Media Safety", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-photo/modern-senior-woman-with-laptop-coffee_23-2148001785.jpg", imageAlt: "Social media security" },
|
{ id: "3", name: "Social Media Safety", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/modern-senior-woman-with-laptop-coffee_23-2148001785.jpg", imageAlt: "Social media security" },
|
||||||
{ id: "4", name: "Banking & Financial Fraud", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-photo/senior-man-looking-through-his-laptop-his-wife_23-2148404356.jpg?_wi=2", imageAlt: "Banking security" },
|
{ id: "4", name: "Banking & Financial Fraud", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/senior-man-looking-through-his-laptop-his-wife_23-2148404356.jpg?_wi=2", imageAlt: "Banking security" },
|
||||||
{ id: "5", name: "Password & Account Security", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-photo/extreme-close-up-shot-man-working-notebook-data-center_482257-89921.jpg?_wi=2", imageAlt: "Password strength" },
|
{ id: "5", name: "Password & Account Security", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/extreme-close-up-shot-man-working-notebook-data-center_482257-89921.jpg?_wi=2", imageAlt: "Password strength" },
|
||||||
{ id: "6", name: "Privacy Protection", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-photo/african-american-man-using-ai-develop-software-system-with-chroma-key-pc_482257-118525.jpg?_wi=1", imageAlt: "Privacy settings" },
|
{ id: "6", name: "Privacy Protection", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/african-american-man-using-ai-develop-software-system-with-chroma-key-pc_482257-118525.jpg?_wi=1", imageAlt: "Privacy settings" },
|
||||||
{ id: "7", name: "Safe Browsing & Downloads", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-vector/flat-background-safer-internet-day_23-2151121216.jpg?_wi=1", imageAlt: "Safe website browsing" },
|
{ id: "7", name: "Safe Browsing & Downloads", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/flat-background-safer-internet-day_23-2151121216.jpg?_wi=1", imageAlt: "Safe website browsing" },
|
||||||
{ id: "8", name: "Device Security", price: "Start Lesson", imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg?_wi=2", imageAlt: "Device protection" }
|
{ id: "8", name: "Device Security", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg?_wi=2", imageAlt: "Device protection" }
|
||||||
]}
|
]}
|
||||||
gridVariant="uniform-all-items-equal"
|
gridVariant="uniform-all-items-equal"
|
||||||
animationType="slide-up"
|
animationType="slide-up"
|
||||||
|
|||||||
Reference in New Issue
Block a user