Update src/app/page.tsx

This commit is contained in:
2026-03-12 11:42:01 +00:00
parent 2d985bfa19
commit be4982d393

View File

@@ -51,7 +51,7 @@ export default function LandingPage() {
]}
buttonAnimation="slide-up"
background={{ variant: 'downward-rays-animated-grid' }}
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-futuristic-cybersecurity-network-visua-1773315676808-19491642.png"
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-futuristic-cybersecurity-network-visua-1773315676808-19491642.png?_wi=1"
imageAlt="Futuristic cybersecurity network visualization"
mediaAnimation="blur-reveal"
frameStyle="card"
@@ -68,7 +68,7 @@ export default function LandingPage() {
{
title: 'Data Science (Big Data Analytics: Tools and Techniques)',
description: 'March 25, 2026 | Presidency University | 3 hours | Instructor: ZecurX Team',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-professional-data-science-and-big-data-1773315678789-8f128831.png',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-professional-data-science-and-big-data-1773315678789-8f128831.png?_wi=1',
imageAlt: 'Workshop spotlight event',
buttonIcon: ArrowRight,
buttonHref: '#contact',
@@ -76,7 +76,7 @@ export default function LandingPage() {
{
title: 'Generative AI and Offensive Security',
description: 'February 25, 2026 | Ramaiah Institute | 90 minutes | Advanced cybersecurity threats',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/abstract-cybersecurity-threat-visualizat-1773315676921-413a936e.png',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/abstract-cybersecurity-threat-visualizat-1773315676921-413a936e.png?_wi=1',
imageAlt: 'AI and offensive security',
buttonIcon: ArrowRight,
buttonHref: '#contact',
@@ -84,7 +84,7 @@ export default function LandingPage() {
{
title: 'Introduction to Cyber Security',
description: 'February 13, 2026 | Nitte Meenakshi Institute | 90 minutes | Beginner-friendly fundamentals',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-futuristic-cybersecurity-network-visua-1773315676808-19491642.png',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-futuristic-cybersecurity-network-visua-1773315676808-19491642.png?_wi=2',
imageAlt: 'Cyber security fundamentals',
buttonIcon: ArrowRight,
buttonHref: '#contact',
@@ -92,7 +92,7 @@ export default function LandingPage() {
{
title: 'Decode Data: Privacy, Protection and You',
description: 'March 7, 2026 | Mount Carmel | 2 hours | Data privacy essentials',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-professional-data-science-and-big-data-1773315678789-8f128831.png',
imageSrc: 'https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/a-professional-data-science-and-big-data-1773315678789-8f128831.png?_wi=2',
imageAlt: 'Data privacy workshop',
buttonIcon: ArrowRight,
buttonHref: '#contact',
@@ -113,7 +113,7 @@ export default function LandingPage() {
{ value: '20+', title: 'Universities Partnered' },
{ value: '50+', title: 'Workshops Conducted' },
]}
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/abstract-cybersecurity-threat-visualizat-1773315676921-413a936e.png"
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AqMM5gGPrg2xpbGx2soIlMnW3O/abstract-cybersecurity-threat-visualizat-1773315676921-413a936e.png?_wi=2"
imageAlt="Cyber threat protection visualization"
mediaAnimation="slide-up"
metricsAnimation="slide-up"