Merge version_1 into main #3
@@ -50,8 +50,8 @@ export default function LandingPage() {
|
||||
{ text: "Contact Me", href: "#contact" }
|
||||
]}
|
||||
mediaItems={[
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "cybersecurity background tech" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "firewall digital security" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=1", imageAlt: "cybersecurity background tech" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=1", imageAlt: "firewall digital security" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/businessman-presenting-invisible-hologram-projecting-from-tablet-advanced-technology_53876-105191.jpg", imageAlt: "hacker terminal interface" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-dots-lines-connected_1048-11946.jpg", imageAlt: "cybersecurity background tech" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637763.jpg", imageAlt: "firewall digital security" }
|
||||
@@ -84,8 +84,8 @@ export default function LandingPage() {
|
||||
useInvertedBackground={false}
|
||||
features={[
|
||||
{ id: "s1", title: "Offensive Security", description: "Penetration testing, bug hunting, and exploit development.", tag: "Red Team", imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg", imageAlt: "hacker terminal interface" },
|
||||
{ id: "s2", title: "Defensive Security", description: "SIEM, threat monitoring, and incident response planning.", tag: "Blue Team", imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "hacker terminal interface" },
|
||||
{ id: "s3", title: "Security Tooling", description: "Burp Suite, Wireshark, Nmap, and automation tools.", tag: "Tooling", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "hacker terminal interface" }
|
||||
{ id: "s2", title: "Defensive Security", description: "SIEM, threat monitoring, and incident response planning.", tag: "Blue Team", imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=2", imageAlt: "hacker terminal interface" },
|
||||
{ id: "s3", title: "Security Tooling", description: "Burp Suite, Wireshark, Nmap, and automation tools.", tag: "Tooling", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2", imageAlt: "hacker terminal interface" }
|
||||
]}
|
||||
title="My Expertise"
|
||||
description="A comprehensive toolkit for securing systems and testing their limits."
|
||||
|
||||
Reference in New Issue
Block a user