<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cysa.baremetalcyber.com/</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-1-welcome-to-the-cysa-who-it-s-for-and-why-it-matters</loc>
    <lastmod>2026-04-02T18:50:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-2-understanding-the-cysa-exam-structure-and-domains</loc>
    <lastmod>2026-04-02T18:50:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-3-cysa-vs-other-security-certifications-where-it-fits</loc>
    <lastmod>2026-04-02T18:50:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-4-how-to-study-for-the-cysa-plus-tools-labs-and-habits</loc>
    <lastmod>2026-04-02T18:50:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-5-what-to-expect-on-exam-day-questions-time-and-tips</loc>
    <lastmod>2026-04-02T18:50:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-6-core-cybersecurity-foundations-you-need-before-you-start</loc>
    <lastmod>2026-04-02T18:50:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-7-example-performance-based-questions-pbqs-walkthrough</loc>
    <lastmod>2026-04-02T18:50:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-8-cysa-multiple-choice-question-strategies</loc>
    <lastmod>2026-04-02T18:50:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-9-building-your-own-cybersecurity-lab-environment</loc>
    <lastmod>2026-04-02T18:50:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-10-life-after-cysa-certification-career-paths-and-professional-growth</loc>
    <lastmod>2026-04-02T18:51:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-11-communicating-cybersecurity-to-non-technical-stakeholders</loc>
    <lastmod>2026-04-02T18:51:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-12-comprehensive-domain-1-2-review-pre-exam-checklist</loc>
    <lastmod>2026-04-02T18:51:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-13-comprehensive-domain-3-4-review-pre-exam-checklist</loc>
    <lastmod>2026-04-02T18:51:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-14-cysa-glossary-episode-1</loc>
    <lastmod>2026-04-02T18:53:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-15-cysa-glossary-episode-2</loc>
    <lastmod>2026-04-02T18:53:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-16-cysa-glossary-episode-3</loc>
    <lastmod>2026-04-02T18:53:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-17-domain-1-overview-security-operations-in-the-analyst-s-world</loc>
    <lastmod>2026-04-02T18:53:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-18-log-ingestion-and-logging-control</loc>
    <lastmod>2026-04-02T18:53:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-19-core-os-concepts-every-analyst-should-know</loc>
    <lastmod>2026-04-02T18:53:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-20-system-level-behavior-and-architecture-fundamentals</loc>
    <lastmod>2026-04-02T18:53:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-21-infrastructure-concepts-in-modern-socs</loc>
    <lastmod>2026-04-02T18:53:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-22-network-architecture-design-and-segmentation</loc>
    <lastmod>2026-04-02T18:53:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-23-identity-and-access-management-models</loc>
    <lastmod>2026-04-02T18:53:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-24-encryption-and-traffic-security-monitoring</loc>
    <lastmod>2026-04-02T18:53:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-25-sensitive-data-handling-in-the-enterprise</loc>
    <lastmod>2026-04-02T18:53:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-26-network-based-indicators-of-malicious-activity</loc>
    <lastmod>2026-04-02T18:53:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-27-host-based-indicators-of-malicious-activity</loc>
    <lastmod>2026-04-02T18:53:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-28-application-behavior-and-anomaly-detection</loc>
    <lastmod>2026-04-02T18:53:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-29-social-engineering-and-obfuscation-detection</loc>
    <lastmod>2026-04-02T18:53:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-30-network-capture-and-traffic-inspection-tools</loc>
    <lastmod>2026-04-02T18:53:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-31-log-correlation-and-orchestration-platforms-siem-soar</loc>
    <lastmod>2026-04-02T18:53:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-32-endpoint-detection-and-response-systems-edr</loc>
    <lastmod>2026-04-02T18:55:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-33-dns-and-ip-intelligence-sources</loc>
    <lastmod>2026-04-02T18:55:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-34-static-file-inspection-tools</loc>
    <lastmod>2026-04-02T18:55:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-35-dynamic-malware-analysis-platforms-sandboxing</loc>
    <lastmod>2026-04-02T18:55:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-36-common-detection-techniques-in-the-soc</loc>
    <lastmod>2026-04-02T18:56:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-37-pattern-recognition-and-command-analysis</loc>
    <lastmod>2026-04-02T18:56:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-38-suspicious-command-interpretation</loc>
    <lastmod>2026-04-02T18:56:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-39-email-analysis-for-phishing-and-spoofing</loc>
    <lastmod>2026-04-02T18:56:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-40-hashing-and-file-integrity-techniques</loc>
    <lastmod>2026-04-02T18:56:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-41-detecting-abnormal-user-behavior</loc>
    <lastmod>2026-04-02T18:56:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-42-security-scripting-and-automation-basics</loc>
    <lastmod>2026-04-02T18:56:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-43-threat-actor-categories-and-profiles</loc>
    <lastmod>2026-04-02T18:56:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-44-insider-threats-and-supply-chain-risks</loc>
    <lastmod>2026-04-02T18:56:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-45-threat-intelligence-confidence-levels-and-ttps</loc>
    <lastmod>2026-04-02T18:56:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-46-open-source-threat-intelligence-collection</loc>
    <lastmod>2026-04-02T18:56:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-47-closed-source-threat-intel-and-information-sharing</loc>
    <lastmod>2026-04-02T18:56:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-48-how-threat-intelligence-powers-security-functions</loc>
    <lastmod>2026-04-02T18:56:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-49-indicators-of-compromise-and-threat-hunting</loc>
    <lastmod>2026-04-02T18:56:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-50-threat-hunting-focus-areas-and-active-defense</loc>
    <lastmod>2026-04-02T18:56:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-51-standardizing-and-automating-security-processes</loc>
    <lastmod>2026-04-02T18:56:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-52-streamlining-with-soar-and-threat-feed-enrichment</loc>
    <lastmod>2026-04-02T19:13:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-53-integrating-apis-and-plugins-for-efficiency</loc>
    <lastmod>2026-04-02T19:13:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-54-single-pane-of-glass-visibility-in-the-soc</loc>
    <lastmod>2026-04-02T19:13:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-55-domain-2-overview-vulnerability-management-in-practice</loc>
    <lastmod>2026-04-02T19:13:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-56-asset-discovery-in-the-wild</loc>
    <lastmod>2026-04-02T19:13:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-57-vulnerability-scanning-special-considerations</loc>
    <lastmod>2026-04-02T19:13:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-58-internal-vs-external-scanning-strategies</loc>
    <lastmod>2026-04-02T19:13:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-59-agent-based-vs-agentless-scanning</loc>
    <lastmod>2026-04-02T19:13:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-60-credentialed-vs-non-credentialed-scans</loc>
    <lastmod>2026-04-02T19:13:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-61-passive-vs-active-vulnerability-detection</loc>
    <lastmod>2026-04-02T19:13:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-62-static-vs-dynamic-analysis-techniques</loc>
    <lastmod>2026-04-02T19:13:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-63-scanning-critical-infrastructure-systems-ot-ics-scada</loc>
    <lastmod>2026-04-02T19:14:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-64-security-baseline-scanning-techniques</loc>
    <lastmod>2026-04-02T19:14:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-65-industry-frameworks-for-vulnerability-management</loc>
    <lastmod>2026-04-02T19:14:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-66-network-scanning-and-mapping-tools</loc>
    <lastmod>2026-04-02T19:14:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-67-web-application-scanning-tools</loc>
    <lastmod>2026-04-02T19:14:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-68-vulnerability-scanners-explained-nessus-openvas</loc>
    <lastmod>2026-04-02T19:14:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-69-debugging-tools-for-vulnerability-analysts</loc>
    <lastmod>2026-04-02T19:14:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-70-multipurpose-tools-for-advanced-analysts-nmap-msf-recon-ng</loc>
    <lastmod>2026-04-02T19:14:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-71-cloud-vulnerability-assessment-tools-scout-suite-prowler</loc>
    <lastmod>2026-04-02T19:14:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-72-understanding-cvss-and-scoring-vulnerabilities</loc>
    <lastmod>2026-04-02T19:30:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-73-validating-scanner-results-reducing-false-positives-and-negatives</loc>
    <lastmod>2026-04-02T19:30:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-74-context-aware-vulnerability-analysis</loc>
    <lastmod>2026-04-02T19:31:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-75-weaponization-and-exploitability-considerations</loc>
    <lastmod>2026-04-02T19:31:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-76-asset-value-and-business-impact</loc>
    <lastmod>2026-04-02T19:31:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-77-cross-site-scripting-vulnerabilities-xss</loc>
    <lastmod>2026-04-02T19:32:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-78-overflow-vulnerabilities</loc>
    <lastmod>2026-04-02T19:32:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-79-data-poisoning-risks</loc>
    <lastmod>2026-04-02T19:32:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-80-broken-access-control-flaws</loc>
    <lastmod>2026-04-02T19:32:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-81-cryptographic-failures</loc>
    <lastmod>2026-04-02T19:32:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-82-injection-flaws-explained</loc>
    <lastmod>2026-04-02T19:32:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-83-cross-site-request-forgery-csrf</loc>
    <lastmod>2026-04-02T19:32:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-84-directory-traversal-vulnerabilities</loc>
    <lastmod>2026-04-02T19:32:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-85-insecure-design-patterns</loc>
    <lastmod>2026-04-02T19:32:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-86-security-misconfiguration-issues</loc>
    <lastmod>2026-04-02T19:32:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-87-end-of-life-and-legacy-component-risk</loc>
    <lastmod>2026-04-02T19:32:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-88-identification-and-authentication-failures</loc>
    <lastmod>2026-04-02T19:32:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-89-server-side-request-forgery-ssrf</loc>
    <lastmod>2026-04-02T19:32:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-90-remote-code-execution-rce-threats</loc>
    <lastmod>2026-04-02T19:32:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-91-privilege-escalation-techniques-and-dangers</loc>
    <lastmod>2026-04-02T19:32:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-92-local-remote-file-inclusion-lfi-rfi</loc>
    <lastmod>2025-07-15T03:21:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-93-compensating-controls-in-vulnerability-management</loc>
    <lastmod>2025-07-15T03:21:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-94-control-types-and-their-purposes</loc>
    <lastmod>2025-07-15T03:24:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-95-patch-and-configuration-management-lifecycle</loc>
    <lastmod>2025-07-15T03:25:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-96-maintenance-windows-and-update-timing</loc>
    <lastmod>2025-07-15T03:26:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-97-documenting-and-handling-exceptions</loc>
    <lastmod>2025-07-15T03:27:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-98-risk-management-principles-for-vulnerability-response</loc>
    <lastmod>2025-07-15T03:28:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-99-policy-governance-and-slo-integration</loc>
    <lastmod>2025-07-15T03:29:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-100-vulnerability-prioritization-and-escalation</loc>
    <lastmod>2025-07-15T03:30:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-101-attack-surface-management-in-action</loc>
    <lastmod>2025-07-15T03:31:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-102-secure-coding-best-practices-for-analysts</loc>
    <lastmod>2025-07-15T03:32:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-103-secure-software-development-lifecycle-sdlc</loc>
    <lastmod>2025-07-15T03:32:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-104-threat-modeling-for-analysts</loc>
    <lastmod>2025-07-15T03:33:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-105-domain-2-review-from-scanning-to-secure-development</loc>
    <lastmod>2025-07-15T03:34:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-106-domain-3-overview-mastering-incident-response-and-management</loc>
    <lastmod>2025-07-15T03:35:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-107-cyber-kill-chains-from-recon-to-exploitation</loc>
    <lastmod>2025-07-15T03:35:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-108-the-diamond-model-of-intrusion-analysis</loc>
    <lastmod>2025-07-15T03:36:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-109-mitre-att-ck-framework-for-analysts</loc>
    <lastmod>2026-04-02T19:37:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-110-open-source-security-testing-methodology-manual-osstmm</loc>
    <lastmod>2025-07-15T03:38:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-111-indicators-of-compromise-iocs-detection-foundations</loc>
    <lastmod>2025-07-15T03:39:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-112-evidence-acquisition-and-chain-of-custody</loc>
    <lastmod>2026-04-02T19:39:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-113-data-and-log-analysis-during-an-incident</loc>
    <lastmod>2026-04-02T19:39:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-114-containment-eradication-and-recovery-phases</loc>
    <lastmod>2026-04-02T19:39:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-115-incident-preparation-building-a-response-program</loc>
    <lastmod>2026-04-02T19:39:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-116-post-incident-activity-and-organizational-learning</loc>
    <lastmod>2026-04-02T19:39:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-117-domain-4-overview-reporting-and-communication-in-cybersecurity</loc>
    <lastmod>2026-04-02T19:39:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-118-vulnerability-management-reporting-essentials</loc>
    <lastmod>2026-04-02T19:39:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-119-creating-and-understanding-compliance-reports</loc>
    <lastmod>2026-04-02T19:39:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-120-action-plans-and-remediation-communication</loc>
    <lastmod>2026-04-02T19:39:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-121-inhibitors-to-remediation</loc>
    <lastmod>2026-04-02T19:39:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-122-metrics-and-kpis-in-vulnerability-management</loc>
    <lastmod>2026-04-02T19:39:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-123-identifying-stakeholders-for-vulnerability-reporting</loc>
    <lastmod>2026-04-02T19:39:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-124-stakeholder-communication-for-incident-response</loc>
    <lastmod>2026-04-02T19:39:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-125-incident-declaration-and-escalation-procedures</loc>
    <lastmod>2026-04-02T19:39:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-126-writing-effective-incident-response-reports</loc>
    <lastmod>2026-04-02T19:39:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-127-legal-and-pr-communications-during-an-incident</loc>
    <lastmod>2026-04-02T19:39:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-128-customer-and-media-communications</loc>
    <lastmod>2026-04-02T19:39:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-129-regulatory-and-law-enforcement-reporting</loc>
    <lastmod>2026-04-02T19:39:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/episode-130-root-cause-analysis-and-incident-performance-metrics</loc>
    <lastmod>2026-04-02T19:38:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cysa.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T23:16:22Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
