<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cissp.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T02:58:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/what-is-the-cissp-and-why-it-matters</loc>
    <lastmod>2026-01-17T16:10:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/cissp-vs-other-certifications-which-one-s-right-for-you</loc>
    <lastmod>2026-01-17T16:11:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/career-impact-of-the-cissp-roles-salaries-growth</loc>
    <lastmod>2026-01-17T16:11:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/how-to-study-and-pass-the-cissp-exam-resources-and-mindset</loc>
    <lastmod>2026-01-17T16:11:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/the-cia-triad-confidentiality-integrity-availability</loc>
    <lastmod>2026-01-17T16:11:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-governance-principles-frameworks-and-strategy</loc>
    <lastmod>2026-01-17T16:11:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/compliance-requirements-legal-regulatory-contractual</loc>
    <lastmod>2026-01-17T16:11:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/organizational-roles-and-responsibilities</loc>
    <lastmod>2026-01-17T16:12:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/professional-ethics-and-isc-code-of-ethics</loc>
    <lastmod>2026-01-17T16:12:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/risk-management-concepts-threats-vulnerabilities-risk</loc>
    <lastmod>2026-01-17T16:12:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/risk-response-and-risk-appetite</loc>
    <lastmod>2026-01-17T16:12:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/business-continuity-planning-bcp-fundamentals</loc>
    <lastmod>2026-01-17T16:12:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/disaster-recovery-planning-drp-and-continuity-of-operations</loc>
    <lastmod>2026-01-17T16:12:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-policies-standards-procedures-and-guidelines</loc>
    <lastmod>2026-01-17T16:13:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/personnel-security-background-checks-policies-termination</loc>
    <lastmod>2026-01-17T16:13:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-awareness-and-training-programs</loc>
    <lastmod>2026-01-17T16:13:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/third-party-risk-management</loc>
    <lastmod>2026-01-17T16:13:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/supply-chain-risk-and-due-diligence</loc>
    <lastmod>2026-01-17T16:13:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/privacy-principles-and-data-protection-gdpr-ccpa</loc>
    <lastmod>2026-01-17T16:13:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/intellectual-property-and-licensing-laws</loc>
    <lastmod>2026-01-17T16:13:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/legal-systems-and-cybercrime-laws-globally</loc>
    <lastmod>2026-01-17T16:14:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-documentation-and-governance-metrics</loc>
    <lastmod>2026-01-17T16:14:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/information-lifecycle-and-data-classification</loc>
    <lastmod>2026-01-17T16:14:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/data-sensitivity-and-labeling-requirements</loc>
    <lastmod>2026-01-17T16:14:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/ownership-and-stewardship-responsibilities</loc>
    <lastmod>2026-01-17T16:15:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/data-retention-and-archival-strategies</loc>
    <lastmod>2026-01-17T16:15:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/privacy-protection-and-pii-handling</loc>
    <lastmod>2026-01-17T16:16:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/data-remanence-and-secure-disposal-techniques</loc>
    <lastmod>2026-01-17T16:16:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-data-handling-in-transit-and-at-rest</loc>
    <lastmod>2026-01-17T16:16:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/media-storage-and-sanitization-methods</loc>
    <lastmod>2026-01-17T16:16:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/asset-inventory-management</loc>
    <lastmod>2026-01-17T16:16:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/data-sovereignty-and-jurisdictional-control</loc>
    <lastmod>2026-01-17T16:16:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-use-of-cloud-storage-and-shared-resources</loc>
    <lastmod>2026-01-17T16:17:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/backup-controls-and-data-recovery</loc>
    <lastmod>2026-01-17T16:17:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/handling-of-sensitive-systems-and-high-value-assets</loc>
    <lastmod>2026-01-17T16:17:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/logging-monitoring-and-metadata-retention-for-assets</loc>
    <lastmod>2026-01-17T16:17:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-design-principles-defense-in-depth-least-privilege</loc>
    <lastmod>2026-01-17T16:17:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-models-bell-lapadula-biba-clark-wilson</loc>
    <lastmod>2026-01-17T16:17:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/architecture-layers-osi-system-application</loc>
    <lastmod>2026-01-17T16:17:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-hardware-architecture-and-tpm</loc>
    <lastmod>2026-01-17T16:18:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/virtualization-and-cloud-infrastructure-considerations</loc>
    <lastmod>2026-01-17T16:18:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-baseline-and-configuration-management</loc>
    <lastmod>2026-01-17T16:18:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/common-security-flaws-in-architecture</loc>
    <lastmod>2026-01-17T16:18:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/cryptographic-concepts-symmetric-and-asymmetric</loc>
    <lastmod>2026-01-17T16:18:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/cryptographic-lifecycle-algorithms-strength-obsolescence</loc>
    <lastmod>2026-01-17T16:18:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/hashing-and-message-integrity</loc>
    <lastmod>2026-01-17T16:18:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/key-management-and-key-escrow</loc>
    <lastmod>2026-01-17T16:19:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/pki-digital-certificates-and-trust-models</loc>
    <lastmod>2026-01-17T16:19:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/cryptanalysis-and-attacks-against-crypto</loc>
    <lastmod>2026-01-17T16:19:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-evaluations-common-criteria-rmf-iso-iec</loc>
    <lastmod>2026-01-17T16:19:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-boundaries-and-isolation-techniques</loc>
    <lastmod>2026-01-17T16:19:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/emerging-technologies-and-security-architecture-e-g-iot-ai</loc>
    <lastmod>2026-01-17T16:19:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/scada-and-embedded-system-security</loc>
    <lastmod>2026-01-17T16:19:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/fault-tolerance-redundancy-and-high-availability</loc>
    <lastmod>2026-01-17T16:19:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/network-architecture-lan-wan-internet</loc>
    <lastmod>2026-01-17T16:20:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/osi-and-tcp-ip-models-refresher</loc>
    <lastmod>2026-01-17T16:20:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-protocols-https-ssh-sftp-snmpv3</loc>
    <lastmod>2026-01-17T16:20:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/network-segmentation-and-microsegmentation</loc>
    <lastmod>2026-01-17T16:20:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/defense-in-depth-with-firewalls-and-dmzs</loc>
    <lastmod>2026-01-17T16:21:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/intrusion-detection-and-prevention-systems</loc>
    <lastmod>2026-01-17T16:21:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-routing-and-switching</loc>
    <lastmod>2026-01-17T16:21:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/vpns-remote-access-and-tunneling-protocols</loc>
    <lastmod>2026-01-17T16:21:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/wireless-network-security-wep-wpa2-3-802-1x</loc>
    <lastmod>2026-01-17T16:22:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/voip-and-secure-communication-channels</loc>
    <lastmod>2026-01-17T16:22:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/network-address-translation-and-proxy-usage</loc>
    <lastmod>2026-01-17T16:22:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/network-monitoring-and-traffic-analysis</loc>
    <lastmod>2026-01-17T16:22:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/zero-trust-and-software-defined-networking-sdn</loc>
    <lastmod>2026-01-17T16:23:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/content-delivery-networks-and-edge-security</loc>
    <lastmod>2026-01-17T16:23:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/cloud-network-security-casb-sase-virtual-firewalls</loc>
    <lastmod>2026-01-17T16:23:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/ddos-protection-and-high-availability-networks</loc>
    <lastmod>2026-01-17T16:23:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/authentication-factors-and-methods</loc>
    <lastmod>2026-01-17T16:23:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/identity-proofing-and-registration-processes</loc>
    <lastmod>2026-01-17T16:23:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/authorization-techniques-rbac-abac-mac-dac</loc>
    <lastmod>2026-01-17T16:23:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/iam-lifecycle-and-governance</loc>
    <lastmod>2026-01-17T16:24:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/password-policy-design-and-management</loc>
    <lastmod>2026-01-17T16:24:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/biometric-authentication-strengths-and-weaknesses</loc>
    <lastmod>2026-01-17T16:24:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/federation-and-sso-saml-oauth-openid</loc>
    <lastmod>2026-01-17T16:24:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/privileged-access-management-pam</loc>
    <lastmod>2026-01-17T16:24:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/directory-services-ldap-active-directory</loc>
    <lastmod>2026-01-17T16:24:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/multi-factor-authentication-and-implementation</loc>
    <lastmod>2026-01-17T16:25:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/identity-as-a-service-idaas-and-cloud-iam</loc>
    <lastmod>2026-01-17T16:25:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/credential-management-and-recovery</loc>
    <lastmod>2026-01-17T16:25:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/access-control-lists-and-capability-tables</loc>
    <lastmod>2026-01-17T16:25:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/access-recertification-and-review</loc>
    <lastmod>2026-01-17T16:25:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/session-management-and-timeout-policies</loc>
    <lastmod>2026-01-17T16:25:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/threats-to-iam-replay-pass-the-hash-credential-stuffing</loc>
    <lastmod>2026-01-17T16:26:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/assessment-types-vulnerability-scans-pen-testing-audits</loc>
    <lastmod>2026-01-17T16:26:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/planning-a-security-assessment</loc>
    <lastmod>2026-01-17T16:26:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-control-testing-manual-vs-automated</loc>
    <lastmod>2026-01-17T16:26:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/code-review-and-static-dynamic-testing</loc>
    <lastmod>2026-01-17T16:26:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-test-data-and-environment-management</loc>
    <lastmod>2026-01-17T16:26:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/test-coverage-and-measurement</loc>
    <lastmod>2026-01-17T16:26:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/risk-assessment-and-gap-analysis</loc>
    <lastmod>2026-01-17T16:27:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/compliance-auditing-and-evidence-collection</loc>
    <lastmod>2026-01-17T16:27:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/log-analysis-for-forensics-and-compliance</loc>
    <lastmod>2026-01-17T16:27:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/threat-hunting-and-red-team-exercises</loc>
    <lastmod>2026-01-17T16:27:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/reporting-assessment-results-effectively</loc>
    <lastmod>2026-01-17T16:27:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/metrics-and-kpis-for-security-performance</loc>
    <lastmod>2026-01-17T16:27:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/continuous-monitoring-and-feedback-loops</loc>
    <lastmod>2026-01-17T16:28:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/assessing-third-party-and-vendor-risk</loc>
    <lastmod>2026-01-17T16:28:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/daily-operations-procedures-monitoring-checklists</loc>
    <lastmod>2026-01-17T16:28:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/logging-event-correlation-and-siem</loc>
    <lastmod>2026-01-17T16:28:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/incident-management-preparation-and-response</loc>
    <lastmod>2026-01-17T16:29:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/digital-forensics-and-chain-of-custody</loc>
    <lastmod>2026-01-17T16:29:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/evidence-acquisition-and-preservation</loc>
    <lastmod>2026-01-17T16:29:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/disaster-recovery-planning-rto-rpo</loc>
    <lastmod>2026-01-17T16:29:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/business-continuity-testing-and-tabletop-exercises</loc>
    <lastmod>2026-01-17T16:29:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/patch-management-and-configuration-control</loc>
    <lastmod>2026-01-17T16:29:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/change-control-and-approval-processes</loc>
    <lastmod>2026-01-17T16:29:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-disposal-and-media-sanitization</loc>
    <lastmod>2026-01-17T16:29:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/endpoint-detection-and-response-edr</loc>
    <lastmod>2026-01-17T16:29:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/insider-threat-identification-and-mitigation</loc>
    <lastmod>2026-01-17T16:30:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/malware-analysis-and-containment</loc>
    <lastmod>2026-01-17T16:30:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/physical-security-operations-locks-guards-cameras</loc>
    <lastmod>2026-01-17T16:30:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/personnel-security-controls-and-separation-of-duties</loc>
    <lastmod>2026-01-17T16:30:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-operations-center-soc-best-practices</loc>
    <lastmod>2026-01-17T16:30:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/software-development-lifecycle-sdlc-models</loc>
    <lastmod>2026-01-17T16:30:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/waterfall-vs-agile-vs-devops-approaches</loc>
    <lastmod>2026-01-17T16:30:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-design-and-secure-coding-guidelines</loc>
    <lastmod>2026-01-17T16:30:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/input-validation-and-output-encoding</loc>
    <lastmod>2026-01-17T16:31:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/owasp-top-10-threats-and-controls</loc>
    <lastmod>2026-01-17T19:28:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/buffer-overflows-sql-injection-and-common-flaws</loc>
    <lastmod>2026-01-17T19:28:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/security-testing-sast-dast-iast</loc>
    <lastmod>2026-01-17T19:29:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/code-repositories-and-access-controls</loc>
    <lastmod>2026-01-17T19:29:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/configuration-management-and-ci-cd-pipelines</loc>
    <lastmod>2026-01-17T19:29:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/version-control-and-code-integrity</loc>
    <lastmod>2026-01-17T19:29:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/application-whitelisting-and-sandboxing</loc>
    <lastmod>2026-01-17T19:29:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/mobile-application-security-and-reverse-engineering</loc>
    <lastmod>2026-01-17T19:29:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/secure-apis-and-service-integration</loc>
    <lastmod>2026-01-17T19:29:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/devsecops-culture-and-continuous-assurance</loc>
    <lastmod>2026-01-17T19:30:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/top-10-hardest-cissp-concepts-demystified</loc>
    <lastmod>2025-07-06T19:02:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/memory-tricks-and-mnemonics-for-the-cissp</loc>
    <lastmod>2026-01-17T19:30:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/how-to-deconstruct-cissp-questions</loc>
    <lastmod>2026-01-17T19:30:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/understanding-best-first-and-most-likely-wording</loc>
    <lastmod>2026-01-17T19:30:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/adaptive-testing-tips-and-time-management</loc>
    <lastmod>2026-01-17T19:30:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/what-comes-after-the-cissp-career-and-certification-roadmap</loc>
    <lastmod>2025-07-06T19:04:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/what-to-do-if-you-fail-the-cissp</loc>
    <lastmod>2025-07-06T19:04:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T21:22:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/episode-132-memory-tricks-and-mnemonics-for-the-cissp</loc>
    <lastmod>2026-01-17T19:32:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/episode-133-how-to-deconstruct-cissp-questions</loc>
    <lastmod>2026-01-17T19:32:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cissp.baremetalcyber.com/episodes/episode-134-understanding-best-first-and-most-likely-wording</loc>
    <lastmod>2026-01-17T19:32:56Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
