<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//sixfiguresecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>http://sixfiguresecurity.com/topics/here-are-a-few-places-you-can-look-for-jobs/</loc>
		<lastmod>2023-03-07T02:05:34+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/log-ingestion/</loc>
		<lastmod>2023-03-07T02:19:11+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/operating-system-os-concepts/</loc>
		<lastmod>2023-03-07T02:20:06+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/infrastructure-concepts/</loc>
		<lastmod>2023-03-07T02:21:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/network-architecture/</loc>
		<lastmod>2023-03-07T02:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/identity-and-access-management/</loc>
		<lastmod>2023-03-07T02:22:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/encryption/</loc>
		<lastmod>2023-03-07T02:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/sensitive-data-protection/</loc>
		<lastmod>2023-03-07T02:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/jobs-that-use-comptia-cysa/</loc>
		<lastmod>2023-03-07T02:34:28+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/what-skills-will-i-learn/</loc>
		<lastmod>2023-03-07T02:35:29+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/how-does-comptia-cysa-compare/</loc>
		<lastmod>2023-03-07T02:36:18+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/exam-details/</loc>
		<lastmod>2023-03-07T02:37:12+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/about-the-exam/</loc>
		<lastmod>2023-03-07T02:38:01+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/exam-objectives-domains/</loc>
		<lastmod>2023-03-07T02:38:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/comptia-cysa-cs0-003-hardware-and-software-list/</loc>
		<lastmod>2023-03-07T03:33:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/download-course-outline/</loc>
		<lastmod>2023-03-07T03:34:53+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/enterprise-governance-organizational-culture/</loc>
		<lastmod>2024-03-19T01:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/enterprise-governance-legal-regulatory-and-contractual-requirements/</loc>
		<lastmod>2024-03-19T01:52:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/enterprise-governance-organizational-structures-roles-and-responsibilities/</loc>
		<lastmod>2024-03-19T01:53:47+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-strategy-information-security-strategy-development/</loc>
		<lastmod>2024-03-19T01:54:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-strategy-information-governance-frameworks-and-standards/</loc>
		<lastmod>2024-03-19T01:55:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-strategy-strategic-planning/</loc>
		<lastmod>2024-03-19T01:56:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-readiness-incident-response-plan/</loc>
		<lastmod>2024-03-19T02:00:15+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-readiness-business-impact-analysis-bia/</loc>
		<lastmod>2024-03-19T02:00:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-readiness-business-continuity-plan-bcp/</loc>
		<lastmod>2024-03-19T02:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-readiness-disaster-recovery-plan-drp/</loc>
		<lastmod>2024-03-19T02:02:02+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-readiness-incident-classification-categorization/</loc>
		<lastmod>2024-03-19T02:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-readiness-incident-management-training-testing-and-evaluation/</loc>
		<lastmod>2024-03-19T02:03:20+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-operations-incident-management-tools-and-techniques/</loc>
		<lastmod>2024-03-19T02:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-operations-incident-investigation-and-evaluation/</loc>
		<lastmod>2024-03-19T02:04:33+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-operations-incident-containment-methods/</loc>
		<lastmod>2024-03-19T02:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-operations-incident-response-communications-e-g-reporting-notification-escalation/</loc>
		<lastmod>2024-03-19T02:05:42+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-operations-incident-eradication-and-recovery/</loc>
		<lastmod>2024-03-19T02:06:13+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/incident-management-operations-post-incident-review-practices/</loc>
		<lastmod>2024-03-19T02:06:44+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-risk-assessment-emerging-risk-and-threat-landscape/</loc>
		<lastmod>2024-03-19T02:08:21+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-risk-assessment-vulnerability-and-control-deficiency-analysis/</loc>
		<lastmod>2024-03-19T02:08:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-risk-assessment-risk-assessment-and-analysis/</loc>
		<lastmod>2024-03-19T02:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-risk-response-risk-treatment-risk-response-options/</loc>
		<lastmod>2024-03-19T02:09:57+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-risk-response-risk-and-control-ownership/</loc>
		<lastmod>2024-03-19T02:10:32+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-risk-response-risk-monitoring-and-reporting/</loc>
		<lastmod>2024-03-19T02:11:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-development-information-security-program-resources-e-g-people-tools-technologies/</loc>
		<lastmod>2024-03-19T02:12:00+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-development-information-asset-identification-and-classification/</loc>
		<lastmod>2024-03-19T02:12:35+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-development-industry-standards-and-frameworks-for-information-security/</loc>
		<lastmod>2024-03-19T02:13:07+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-development-information-security-policies-procedures-and-guidelines/</loc>
		<lastmod>2024-03-19T02:13:41+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-information-security-program-metrics/</loc>
		<lastmod>2024-03-19T02:14:17+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-management-information-security-control-design-and-selection/</loc>
		<lastmod>2024-03-19T02:14:50+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-management-information-security-control-implementation-and-integrations/</loc>
		<lastmod>2024-03-19T02:15:24+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-management-information-security-control-testing-and-evaluation/</loc>
		<lastmod>2024-03-19T02:15:54+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-management-information-security-awareness-and-training/</loc>
		<lastmod>2024-03-19T02:16:30+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-management-management-of-external-services-e-g-providers-suppliers-third-parties-fourth-parties/</loc>
		<lastmod>2024-03-19T02:17:03+00:00</lastmod>
	</url>
	<url>
		<loc>http://sixfiguresecurity.com/topics/information-security-program-management-information-security-program-communications-and-reporting/</loc>
		<lastmod>2024-03-19T02:20:05+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->