<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://skillswares.com/sitemap-stylesheet.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-data-as-part-of-security-monitoring-activities-part2-2/</loc>
    <lastmod>2021-09-22T07:56:53+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-automation-concepts-and-technologies-2-2/</loc>
    <lastmod>2020-12-04T11:07:55+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-proactive-threat-hunting-2-2/</loc>
    <lastmod>2020-12-04T11:07:50+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-implement-configuration-changes-to-existing-controls-to-improve-security-2-2/</loc>
    <lastmod>2020-12-04T11:07:46+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-data-as-part-of-security-monitoring-activities-2-2/</loc>
    <lastmod>2020-12-04T11:07:40+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-security-solutions-for-infrastructure-management-part2-2/</loc>
    <lastmod>2021-09-22T07:51:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-software-assurance-best-practices-2-2/</loc>
    <lastmod>2020-12-04T11:07:20+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-security-solutions-for-infrastructure-management-2-2/</loc>
    <lastmod>2020-12-04T11:07:13+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-software-assurance-best-practices/</loc>
    <lastmod>2020-12-04T11:07:20+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-threats-and-vulnerabilities-associated-with-specialized-technology-part2-2/</loc>
    <lastmod>2021-09-30T06:44:05+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-3/</loc>
    <lastmod>2021-09-22T07:47:01+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-threats-and-vulnerabilities-associated-with-operating-in-the-cloud-part2-2/</loc>
    <lastmod>2021-09-22T07:44:28+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-the-output-from-common-vulnerability-assessment-tools-part-2-2/</loc>
    <lastmod>2021-09-22T07:38:52+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-implement-controls-to-mitigate-attacks-and-software-vulnerabilities-2-2/</loc>
    <lastmod>2020-12-04T11:07:02+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-threats-and-vulnerabilities-associated-with-operating-in-the-cloud-2-2/</loc>
    <lastmod>2020-12-04T11:06:56+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-threats-and-vulnerabilities-associated-with-specialized-technology-part1-2/</loc>
    <lastmod>2020-12-04T11:06:52+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-the-output-from-common-vulnerability-assessment-tools-2-2/</loc>
    <lastmod>2020-12-04T11:06:47+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-perform-vulnerability-management-activities-2-2/</loc>
    <lastmod>2020-12-04T11:06:42+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-utilize-threat-intelligence-to-support-organizational-security-2-2/</loc>
    <lastmod>2020-12-04T11:06:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-threat-data-and-intelligence-2-2/</loc>
    <lastmod>2020-12-04T11:06:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/chapter-4-monitoring-and-managing-linux-processes-2/</loc>
    <lastmod>2021-09-22T09:51:14+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/chapter-2-kali-linux-command-line-fundamentals-2/</loc>
    <lastmod>2021-09-22T09:45:40+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/biometrics-and-cybersecurity-2/</loc>
    <lastmod>2022-10-27T13:15:43+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/biometrics-and-border-security-2/</loc>
    <lastmod>2022-10-27T13:17:27+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/biometrics-as-a-service-2/</loc>
    <lastmod>2022-10-27T13:20:01+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-13/</loc>
    <lastmod>2024-07-31T07:12:18+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-12/</loc>
    <lastmod>2024-07-31T07:12:18+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-11/</loc>
    <lastmod>2024-07-31T07:12:17+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-10/</loc>
    <lastmod>2024-07-31T07:12:16+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-9/</loc>
    <lastmod>2024-07-31T07:12:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-8/</loc>
    <lastmod>2024-07-31T07:12:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-7/</loc>
    <lastmod>2024-07-31T07:12:14+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-6/</loc>
    <lastmod>2024-07-31T07:12:14+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-5/</loc>
    <lastmod>2024-07-31T07:12:03+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-17/</loc>
    <lastmod>2024-07-31T07:10:24+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-16/</loc>
    <lastmod>2024-07-31T07:10:16+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-15/</loc>
    <lastmod>2024-07-31T07:10:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-14/</loc>
    <lastmod>2024-07-31T07:10:14+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-13/</loc>
    <lastmod>2024-07-31T07:09:58+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-22/</loc>
    <lastmod>2024-07-31T07:06:42+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-21/</loc>
    <lastmod>2024-07-31T07:06:40+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-20/</loc>
    <lastmod>2024-07-31T07:06:33+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-20-2/</loc>
    <lastmod>2024-07-31T07:06:33+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-19/</loc>
    <lastmod>2024-07-31T07:06:32+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-18/</loc>
    <lastmod>2024-07-31T07:06:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-17/</loc>
    <lastmod>2024-07-31T07:06:30+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-16/</loc>
    <lastmod>2024-07-31T07:06:30+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-15/</loc>
    <lastmod>2024-07-31T07:06:29+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-14/</loc>
    <lastmod>2024-07-31T07:06:29+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-various-security-measures-and-their-purposes-part-1/</loc>
    <lastmod>2024-07-31T07:05:07+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-20/</loc>
    <lastmod>2024-07-31T07:01:46+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-19/</loc>
    <lastmod>2024-07-31T07:01:45+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-18/</loc>
    <lastmod>2024-07-31T07:01:45+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-17/</loc>
    <lastmod>2024-07-31T07:01:42+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-16/</loc>
    <lastmod>2024-07-31T07:01:41+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-15/</loc>
    <lastmod>2024-07-31T07:01:40+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-14/</loc>
    <lastmod>2024-07-31T07:01:39+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-13/</loc>
    <lastmod>2024-07-31T07:01:38+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-12/</loc>
    <lastmod>2024-07-31T07:01:38+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-11/</loc>
    <lastmod>2024-07-31T07:01:38+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-10/</loc>
    <lastmod>2024-07-31T07:01:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-9/</loc>
    <lastmod>2024-07-31T07:01:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-8/</loc>
    <lastmod>2024-07-31T07:01:36+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-7/</loc>
    <lastmod>2024-07-31T07:01:35+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-6/</loc>
    <lastmod>2024-07-31T07:01:34+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-5/</loc>
    <lastmod>2024-07-31T07:01:34+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-4/</loc>
    <lastmod>2024-07-31T07:01:19+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-9/</loc>
    <lastmod>2024-07-31T06:44:33+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-8/</loc>
    <lastmod>2024-07-31T06:44:32+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-7/</loc>
    <lastmod>2024-07-31T06:44:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-6/</loc>
    <lastmod>2024-07-31T06:44:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-5/</loc>
    <lastmod>2024-07-31T06:44:30+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-4/</loc>
    <lastmod>2024-07-31T06:44:29+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-3/</loc>
    <lastmod>2024-07-31T06:44:28+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-5-2/</loc>
    <lastmod>2024-07-31T06:44:27+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-4/</loc>
    <lastmod>2024-07-31T06:42:14+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-3/</loc>
    <lastmod>2024-07-31T06:42:12+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-4-2/</loc>
    <lastmod>2024-07-31T06:42:11+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-12/</loc>
    <lastmod>2024-07-31T06:39:30+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-11/</loc>
    <lastmod>2024-07-31T06:39:16+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-10/</loc>
    <lastmod>2024-07-31T06:39:16+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-9/</loc>
    <lastmod>2024-07-31T06:39:16+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-8/</loc>
    <lastmod>2024-07-31T06:39:16+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-7/</loc>
    <lastmod>2024-07-31T06:39:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-6/</loc>
    <lastmod>2024-07-31T06:39:13+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-5/</loc>
    <lastmod>2024-07-31T06:39:13+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-4/</loc>
    <lastmod>2024-07-31T06:39:12+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-3/</loc>
    <lastmod>2024-07-31T06:39:10+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-13/</loc>
    <lastmod>2024-07-31T06:36:23+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-12/</loc>
    <lastmod>2024-07-31T06:36:23+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-11/</loc>
    <lastmod>2024-07-31T06:36:21+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-10/</loc>
    <lastmod>2024-07-31T06:36:20+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-9/</loc>
    <lastmod>2024-07-31T06:33:26+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-8/</loc>
    <lastmod>2024-07-31T06:33:22+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-7/</loc>
    <lastmod>2024-07-31T06:33:19+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-6/</loc>
    <lastmod>2024-07-31T06:33:17+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-5/</loc>
    <lastmod>2024-07-31T06:33:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-4/</loc>
    <lastmod>2024-07-31T06:33:12+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-3/</loc>
    <lastmod>2024-07-31T06:32:52+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-3/</loc>
    <lastmod>2024-07-31T06:30:48+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-3-2/</loc>
    <lastmod>2024-07-31T06:30:39+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-2-2/</loc>
    <lastmod>2024-07-31T06:30:36+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/domain-1-2/</loc>
    <lastmod>2024-07-31T06:29:45+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-elements-of-the-risk-management-process/</loc>
    <lastmod>2024-05-29T20:58:12+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-implement-security-awareness-practices/</loc>
    <lastmod>2024-05-29T20:53:52+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-types-and-purposes-of-audits-and-assessments/</loc>
    <lastmod>2024-05-29T20:53:41+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-elements-of-effective-security-compliance-part-2/</loc>
    <lastmod>2024-05-29T20:53:32+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-elements-of-effective-security-compliance-part-1/</loc>
    <lastmod>2024-05-29T20:53:21+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-processes-associated-with-third-party-risk-assessment-and-management-part-2/</loc>
    <lastmod>2024-05-29T20:53:08+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-processes-associated-with-third-party-risk-assessment-and-management-part-1/</loc>
    <lastmod>2024-05-29T20:53:06+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-elements-of-effective-security-governance-part-2/</loc>
    <lastmod>2024-05-29T20:52:57+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-elements-of-effective-security-governance-part-1/</loc>
    <lastmod>2024-05-29T20:52:54+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-use-data-sources-to-support-an-investigation/</loc>
    <lastmod>2024-05-29T20:43:26+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-appropriate-incident-response-activities-part-2/</loc>
    <lastmod>2024-05-29T20:43:13+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-appropriate-incident-response-activities-part-1/</loc>
    <lastmod>2024-05-29T20:43:03+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-automation-and-orchestration-related-to-secure-operations-part-2/</loc>
    <lastmod>2024-05-29T20:42:46+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-automation-and-orchestration-related-to-secure-operations-part-1/</loc>
    <lastmod>2024-05-29T20:42:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-implement-and-maintain-identity-and-access-management-part-2/</loc>
    <lastmod>2024-05-29T20:42:08+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-implement-and-maintain-identity-and-access-management-part-1/</loc>
    <lastmod>2024-05-29T20:41:58+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-modify-enterprise-capabilities-to-enhance-security-part-3/</loc>
    <lastmod>2024-05-29T20:12:58+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-modify-enterprise-capabilities-to-enhance-security-part-2/</loc>
    <lastmod>2024-05-29T20:12:54+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-modify-enterprise-capabilities-to-enhance-security-part-1/</loc>
    <lastmod>2024-05-29T20:12:52+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-security-alerting-and-monitoring-concepts-and-tools-part-2/</loc>
    <lastmod>2024-05-29T20:12:33+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-security-alerting-and-monitoring-concepts-and-tools-part-1/</loc>
    <lastmod>2024-05-29T20:12:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-various-activities-associated-with-vulnerability-management-part-2/</loc>
    <lastmod>2024-05-29T20:12:07+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-part/</loc>
    <lastmod>2024-05-29T20:11:49+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-part-2/</loc>
    <lastmod>2024-05-29T20:11:42+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-security-implications-of-proper-hardware-software-and-data-asset-management-part-1/</loc>
    <lastmod>2024-05-29T20:11:39+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-common-security-techniques-to-computing-resources-part-3/</loc>
    <lastmod>2024-05-29T20:11:22+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-common-security-techniques-to-computing-resources-part-2/</loc>
    <lastmod>2024-05-29T20:11:18+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-common-security-techniques-to-computing-resources-part-1/</loc>
    <lastmod>2024-05-29T20:11:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-resilience-and-recovery-in-security-architecture-part-2/</loc>
    <lastmod>2024-05-29T19:55:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-resilience-and-recovery-in-security-architecture-part-1/</loc>
    <lastmod>2024-05-29T19:55:28+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-concepts-and-strategies-to-protect-data-part-2/</loc>
    <lastmod>2024-05-29T19:55:06+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-concepts-and-strategies-to-protect-data-part-1/</loc>
    <lastmod>2024-05-29T19:55:02+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-security-principles-to-secure-enterprise-infrastructure-part-2/</loc>
    <lastmod>2024-05-29T19:54:38+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-security-principles-to-secure-enterprise-infrastructure-part-1/</loc>
    <lastmod>2024-05-29T19:54:34+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-security-implications-of-different-architecture-models-part-3/</loc>
    <lastmod>2024-05-29T19:54:06+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-security-implications-of-different-architecture-models-part-2/</loc>
    <lastmod>2024-05-29T19:53:59+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-security-implications-of-different-architecture-models-part-1/</loc>
    <lastmod>2024-05-29T19:53:54+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-purpose-of-mitigation-techniques-used-to-secure-the-enterprise-part-2/</loc>
    <lastmod>2024-05-29T19:31:10+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-purpose-of-mitigation-techniques-used-to-secure-the-enterprise-part-1/</loc>
    <lastmod>2024-05-29T19:31:07+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-indicators-of-malicious-activity-part-3/</loc>
    <lastmod>2024-05-29T19:30:56+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-indicators-of-malicious-activity-part-2/</loc>
    <lastmod>2024-05-29T19:30:52+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-indicators-of-malicious-activity-part-1/</loc>
    <lastmod>2024-05-29T19:30:47+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-various-types-of-vulnerabilities-part-3/</loc>
    <lastmod>2024-05-29T19:30:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-various-types-of-vulnerabilities-part-2/</loc>
    <lastmod>2024-05-29T19:30:32+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-various-types-of-vulnerabilities-part-1/</loc>
    <lastmod>2024-05-29T19:30:27+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-common-threat-vectors-and-attack-surfaces-part-3/</loc>
    <lastmod>2024-05-29T19:30:12+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-common-threat-vectors-and-attack-surfaces-part-2/</loc>
    <lastmod>2024-05-29T19:30:07+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-common-threat-vectors-and-attack-surfaces-part-1/</loc>
    <lastmod>2024-05-29T19:30:03+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-common-threat-actors-and-motivations-part-3/</loc>
    <lastmod>2024-05-29T19:29:45+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-common-threat-actors-and-motivations-part-2/</loc>
    <lastmod>2024-05-29T19:29:42+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/compare-and-contrast-common-threat-actors-and-motivations-part-1/</loc>
    <lastmod>2024-05-29T19:29:36+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-using-appropriate-cryptographic-solutions-part-2/</loc>
    <lastmod>2024-05-29T19:16:18+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-using-appropriate-cryptographic-solutions-part-1/</loc>
    <lastmod>2024-05-29T19:16:11+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-change-management-processes-and-the-impact-to-security-part-3/</loc>
    <lastmod>2024-05-29T19:15:53+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-change-management-processes-and-the-impact-to-security-part-2/</loc>
    <lastmod>2024-05-29T19:15:48+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-change-management-processes-and-the-impact-to-security-part-1/</loc>
    <lastmod>2024-05-29T19:15:38+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-fundamental-security-concepts-part-3/</loc>
    <lastmod>2024-05-29T19:15:08+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/summarize-fundamental-security-concepts-part-2/</loc>
    <lastmod>2024-05-29T19:15:03+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/1-2-summarize-fundamental-security-concepts-part-1/</loc>
    <lastmod>2024-05-29T19:14:43+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/1-1-compare-and-contrast-various-types-of-security-controls/</loc>
    <lastmod>2024-05-29T19:14:31+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-business-continuity-and-disaster-recovery-concepts-part-2/</loc>
    <lastmod>2024-08-27T06:20:19+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-business-continuity-and-disaster-recovery-concepts-part-1/</loc>
    <lastmod>2024-08-27T06:20:05+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-compliance-frameworks-and-legal-considerations-and-their-organizational-impact-part-2/</loc>
    <lastmod>2024-08-27T06:19:50+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-compliance-frameworks-and-legal-considerations-and-their-organizational-impact-part-1/</loc>
    <lastmod>2024-08-27T06:19:44+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/4-2-explain-the-importance-of-managing-and-mitigating-vendor-risk/</loc>
    <lastmod>2024-08-22T09:10:23+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-set-of-requirements-apply-the-appropriate-risk-strategies-part-4/</loc>
    <lastmod>2024-08-22T09:10:14+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-set-of-requirements-apply-the-appropriate-risk-strategies-part-3/</loc>
    <lastmod>2024-08-22T09:09:56+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-the-importance-of-business-continuity-and-disaster-recovery-concepts/</loc>
    <lastmod>2024-03-08T14:45:05+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-compliance-frameworks-and-legal-considerations-and-their-organizational-impact/</loc>
    <lastmod>2024-03-08T14:44:51+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-troubleshoot-issues-with-cryptographic-implementations-2/</loc>
    <lastmod>2024-08-29T08:39:51+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-troubleshoot-issues-with-cryptographic-implementations/</loc>
    <lastmod>2024-08-14T09:32:07+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-business-requirement-implement-the-appropriate-pki-solution-part-2/</loc>
    <lastmod>2024-08-14T09:31:57+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-business-requirement-implement-the-appropriate-pki-solution-part-1/</loc>
    <lastmod>2024-08-14T09:31:49+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-how-cloud-technology-adoption-impacts-organizational-security-part-2/</loc>
    <lastmod>2024-08-13T08:26:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-how-cloud-technology-adoption-impacts-organizational-security-part-1/</loc>
    <lastmod>2024-08-13T08:26:34+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-security-considerations-impacting-specific-sectors-and-operational-technologies-part-3/</loc>
    <lastmod>2024-08-13T08:26:18+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-security-considerations-impacting-specific-sectors-and-operational-technologies-part-2/</loc>
    <lastmod>2024-08-13T08:26:15+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/explain-security-considerations-impacting-specific-sectors-and-operational-technologies-part-1/</loc>
    <lastmod>2024-08-13T08:26:11+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-configure-and-implement-endpoint-security-controls-part-4/</loc>
    <lastmod>2024-08-13T08:25:57+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-configure-and-implement-endpoint-security-controls-part-3/</loc>
    <lastmod>2024-08-13T08:25:54+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-configure-and-implement-endpoint-security-controls-part-2/</loc>
    <lastmod>2024-07-30T06:13:17+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-secure-configurations-to-enterprise-mobility-part-3/</loc>
    <lastmod>2024-07-30T06:12:41+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-secure-configurations-to-enterprise-mobility-part-2/</loc>
    <lastmod>2024-07-30T06:12:37+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-configure-and-implement-endpoint-security-controls/</loc>
    <lastmod>2024-03-08T14:44:10+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-apply-secure-configurations-to-enterprise-mobility/</loc>
    <lastmod>2024-03-08T14:44:03+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-use-forensic-analysis-tools-part-4/</loc>
    <lastmod>2024-09-03T05:47:23+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-use-forensic-analysis-tools-part-3/</loc>
    <lastmod>2024-09-03T05:47:20+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-an-incident-implement-the-appropriate-response-part-2/</loc>
    <lastmod>2024-06-24T06:26:42+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-an-incident-implement-the-appropriate-response-part-1/</loc>
    <lastmod>2024-06-24T06:26:33+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-use-forensic-analysis-tools-part-2/</loc>
    <lastmod>2024-06-24T06:19:25+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-vulnerabilities-and-recommend-risk-mitigations-part-3/</loc>
    <lastmod>2024-06-05T11:42:06+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-vulnerabilities-and-recommend-risk-mitigations-part-2/</loc>
    <lastmod>2024-06-05T11:41:58+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-vulnerabilities/</loc>
    <lastmod>2024-05-10T05:01:17+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-use-the-appropriate-vulnerability/</loc>
    <lastmod>2024-05-10T05:00:50+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/2-3-given-a-scenario-perform-vulnerability-management-activities/</loc>
    <lastmod>2024-05-10T05:00:17+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-analyze-indicators-of-compromise-and-formulate-an-appropriate-response/</loc>
    <lastmod>2024-05-06T06:48:45+04:00</lastmod>
  </url>
  <url>
    <loc>https://skillswares.com/lessons/given-a-scenario-use-forensic-analysis-tools/</loc>
    <lastmod>2024-03-08T14:43:50+04:00</lastmod>
  </url>
</urlset>
