<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//sixfiguresecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>http://sixfiguresecurity.com/lessons/1-1-explain-the-importance-of-system-and-network-architecture-concepts-in-security-operations/</loc>
		<lastmod>2023-03-07T02:15:19+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/1-2-given-a-scenario-analyze-indicators-of-potentially-malicious-activity/</loc>
		<lastmod>2023-03-07T02:27:31+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/1-3-given-a-scenario-use-appropriate-tools-or-techniques-to-determine-malicious-activity/</loc>
		<lastmod>2023-03-07T02:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/1-4-compare-and-contrast-threat-intelligence-and-threat-hunting-concepts/</loc>
		<lastmod>2023-03-07T02:29:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/1-5-explain-the-importance-of-efficiency-and-process-improvement/</loc>
		<lastmod>2023-03-07T02:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/0-1-overview/</loc>
		<lastmod>2023-03-07T02:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/2-1-given-a-scenario-implement-vulnerability-scanning-methods-and-concepts/</loc>
		<lastmod>2023-03-07T02:47:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/2-2-given-a-scenario-analyze-output-from-vulnerability-assessment-tools/</loc>
		<lastmod>2023-03-07T02:48:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/2-3-given-a-scenario-analyze-data-to-prioritize-vulnerabilities/</loc>
		<lastmod>2023-03-07T02:49:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/2-4-given-a-scenario-recommend-controls-to-mitigate-attacks-and-software-vulnerabilities/</loc>
		<lastmod>2023-03-07T02:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/2-5-explain-concepts-related-to-vulnerability-response-handling-and-management/</loc>
		<lastmod>2023-03-07T02:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/3-1-explain-concepts-related-to-attack-methodology-frameworks/</loc>
		<lastmod>2023-03-07T02:54:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/3-2-given-a-scenario-perform-incident-response-activities/</loc>
		<lastmod>2023-03-07T02:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/3-3-explain-the-preparation-and-post-incident-activity-phases-of-the-incident-management-life-cycle/</loc>
		<lastmod>2023-03-07T02:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/4-1-explain-the-importance-of-vulnerability-management-reporting-and-communication/</loc>
		<lastmod>2023-03-07T02:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/4-2-explain-the-importance-of-incident-response-reporting-and-communication/</loc>
		<lastmod>2023-03-07T02:57:36+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/governance/</loc>
		<lastmod>2024-03-19T01:46:27+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/information-security-risk-management/</loc>
		<lastmod>2024-03-19T01:47:49+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/information-security-incident-management/</loc>
		<lastmod>2024-03-19T01:49:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/lessons/information-security-program/</loc>
		<lastmod>2024-03-19T02:20:35+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->