<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://secplus.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T23:13:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/what-is-the-comptia-security-plus-certification</loc>
    <lastmod>2025-08-31T22:14:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/how-the-security-plus-sy0-701-exam-is-organized</loc>
    <lastmod>2025-08-31T22:14:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/preparing-for-the-security-plus-exam-study-strategies-that-work</loc>
    <lastmod>2025-08-31T22:13:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/what-to-expect-on-exam-day-and-beyond</loc>
    <lastmod>2025-08-31T22:13:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-domain-one-general-security-concepts</loc>
    <lastmod>2025-08-31T22:13:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-security-controls-domain-1</loc>
    <lastmod>2025-08-31T22:11:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-control-categories-deep-dive-domain-1</loc>
    <lastmod>2025-08-31T22:12:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/physical-controls-and-their-implementation-domain-1</loc>
    <lastmod>2025-08-31T22:11:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-control-types-explained-part-1-domain-1</loc>
    <lastmod>2025-08-31T22:11:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-control-types-explained-part-2-domain-1</loc>
    <lastmod>2025-08-31T22:10:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/compensating-and-directive-controls-domain-1</loc>
    <lastmod>2025-08-31T22:10:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/confidentiality-integrity-and-availability-cia-triad-domain-1</loc>
    <lastmod>2025-08-31T22:10:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/non-repudiation-and-aaa-authentication-authorization-accounting-domain-1</loc>
    <lastmod>2025-08-31T22:11:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/gap-analysis-and-zero-trust-security-domain-1</loc>
    <lastmod>2025-08-31T22:10:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/physical-security-essentials-domain-1</loc>
    <lastmod>2025-08-31T22:10:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/deception-and-disruption-technologies-domain-1</loc>
    <lastmod>2025-08-31T22:10:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-change-management-domain-1</loc>
    <lastmod>2025-08-31T22:09:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/business-processes-in-change-management-domain-1</loc>
    <lastmod>2025-08-31T22:09:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/effective-implementation-and-maintenance-in-change-management-domain-1</loc>
    <lastmod>2025-08-31T22:10:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/technical-implications-of-change-management-domain-1</loc>
    <lastmod>2025-08-31T22:09:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/episode-16-documentation-and-version-control-domain-1</loc>
    <lastmod>2025-08-31T22:09:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-cryptography-and-pki-domain-1</loc>
    <lastmod>2025-08-31T22:21:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/comprehensive-encryption-techniques-domain-1</loc>
    <lastmod>2025-08-31T22:21:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/cryptographic-hardware-and-secure-storage-domain-1</loc>
    <lastmod>2025-08-31T22:20:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/obfuscation-and-data-protection-techniques-domain-1</loc>
    <lastmod>2025-08-31T22:20:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/hashing-salting-and-digital-signatures-domain-1</loc>
    <lastmod>2025-08-31T22:20:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/advanced-cryptographic-techniques-domain-1</loc>
    <lastmod>2025-08-31T22:20:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/certificates-authorities-and-management-domain-1</loc>
    <lastmod>2025-08-31T22:18:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-domain-two-threats-vulnerabilities-and-mitigations</loc>
    <lastmod>2025-08-31T22:18:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/understanding-threat-actors-domain-2</loc>
    <lastmod>2025-08-31T22:18:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/insider-threats-organized-crime-and-shadow-it-domain-2</loc>
    <lastmod>2025-08-31T22:18:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/attributes-and-capabilities-of-threat-actors-domain-2</loc>
    <lastmod>2025-08-31T22:18:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/motivations-behind-cyber-attacks-part-1-domain-2</loc>
    <lastmod>2025-08-31T22:18:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/motivations-behind-cyber-attacks-part-2-domain-2</loc>
    <lastmod>2025-08-31T22:18:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/motivations-behind-cyber-attacks-part-3-domain-2</loc>
    <lastmod>2025-08-31T22:17:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-threat-vectors-and-attack-surfaces-domain-2</loc>
    <lastmod>2025-08-31T22:17:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/message-based-and-communication-threat-vectors-domain-2</loc>
    <lastmod>2025-08-31T22:17:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/image-file-and-voice-based-threats-domain-2</loc>
    <lastmod>2025-08-31T22:15:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerable-systems-software-and-devices-domain-2</loc>
    <lastmod>2025-08-31T22:15:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/network-based-attack-surfaces-domain-2</loc>
    <lastmod>2025-08-31T22:15:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/open-ports-default-credentials-and-supply-chain-risks-domain-2</loc>
    <lastmod>2025-08-31T22:14:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/human-vectors-and-social-engineering-part-1-domain-2</loc>
    <lastmod>2025-08-31T22:29:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/human-vectors-and-social-engineering-part-2-domain-2</loc>
    <lastmod>2025-08-31T22:29:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/application-level-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:29:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/operating-system-and-web-based-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:29:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/hardware-and-firmware-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:29:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/virtualization-and-cloud-specific-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:28:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/supply-chain-and-cryptographic-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:28:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/misconfiguration-and-mobile-device-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:28:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/understanding-zero-day-vulnerabilities-domain-2</loc>
    <lastmod>2025-08-31T22:28:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/indicators-of-malware-attacks-domain-2</loc>
    <lastmod>2025-08-31T22:28:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/physical-security-attacks-and-indicators-domain-2</loc>
    <lastmod>2025-08-31T22:28:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/network-based-indicators-part-1-domain-2</loc>
    <lastmod>2025-08-31T22:27:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/network-based-indicators-part-2-domain-2</loc>
    <lastmod>2025-08-31T22:27:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/application-level-attack-indicators-domain-2</loc>
    <lastmod>2025-08-31T22:28:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/cryptographic-attack-indicators-domain-2</loc>
    <lastmod>2025-08-31T22:27:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/password-attack-indicators-domain-2</loc>
    <lastmod>2025-08-31T22:26:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/general-indicators-of-malicious-activity-domain-2</loc>
    <lastmod>2025-08-31T22:26:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/segmentation-and-access-control-domain-2</loc>
    <lastmod>2025-08-31T22:26:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/application-allow-lists-and-isolation-domain-2</loc>
    <lastmod>2025-08-31T22:25:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/patching-and-encryption-domain-2</loc>
    <lastmod>2025-08-31T22:25:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/monitoring-and-least-privilege-domain-2</loc>
    <lastmod>2025-08-31T22:37:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/configuration-enforcement-and-decommissioning-domain-2</loc>
    <lastmod>2025-08-31T22:37:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/system-hardening-techniques-part-1-domain-2</loc>
    <lastmod>2025-08-31T22:37:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/system-hardening-techniques-part-2-domain-2</loc>
    <lastmod>2025-08-31T22:37:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/system-hardening-techniques-part-3-domain-2</loc>
    <lastmod>2025-08-31T22:36:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-domain-three-security-architecture</loc>
    <lastmod>2025-08-31T22:36:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/cloud-architecture-and-responsibilities-domain-3</loc>
    <lastmod>2025-08-31T22:36:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/network-infrastructure-security-models-domain-3</loc>
    <lastmod>2025-08-31T22:36:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/on-premises-centralized-and-decentralized-architectures-domain-3</loc>
    <lastmod>2025-08-31T22:36:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/specialized-architecture-models-domain-3</loc>
    <lastmod>2025-08-31T22:36:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/high-availability-architectures-domain-3</loc>
    <lastmod>2025-08-31T22:36:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/architecture-security-considerations-part-1-domain-3</loc>
    <lastmod>2025-08-31T22:36:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/architecture-security-considerations-part-2-domain-3</loc>
    <lastmod>2025-08-31T22:35:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/architecture-security-considerations-part-3-domain-3</loc>
    <lastmod>2025-08-31T22:35:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/infrastructure-security-foundations-domain-3</loc>
    <lastmod>2025-08-31T22:36:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/connectivity-and-failure-modes-domain-3</loc>
    <lastmod>2025-08-31T22:35:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/device-attributes-and-network-appliances-domain-3</loc>
    <lastmod>2025-08-31T22:35:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/load-balancers-and-sensors-domain-3</loc>
    <lastmod>2025-08-31T22:35:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/port-security-and-authentication-protocols-domain-3</loc>
    <lastmod>2025-08-31T22:34:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/firewalls-and-security-gateways-domain-3</loc>
    <lastmod>2025-08-31T22:34:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/secure-communication-and-remote-access-domain-3</loc>
    <lastmod>2025-08-31T22:34:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/advanced-secure-access-solutions-domain-3</loc>
    <lastmod>2025-08-31T22:34:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/selecting-effective-security-controls-domain-3</loc>
    <lastmod>2025-08-31T22:34:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-types-and-their-protection-domain-3</loc>
    <lastmod>2025-08-31T22:34:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/human-vs-non-human-readable-data-domain-3</loc>
    <lastmod>2025-08-31T22:33:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-classification-strategies-part-1-domain-3</loc>
    <lastmod>2025-08-31T22:33:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-classification-strategies-part-2-domain-3</loc>
    <lastmod>2025-08-31T22:33:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/general-data-considerations-states-of-data-domain-3</loc>
    <lastmod>2025-08-31T22:33:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-sovereignty-and-geolocation-domain-3</loc>
    <lastmod>2025-08-31T22:33:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/methods-to-secure-data-part-1-domain-3</loc>
    <lastmod>2025-08-31T22:33:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/methods-to-secure-data-part-2-domain-3</loc>
    <lastmod>2025-08-31T22:32:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/methods-to-secure-data-part-2-domain-3-68248fea-87fa-484d-b2ea-fcb52de5272b</loc>
    <lastmod>2025-08-31T22:32:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/methods-to-secure-data-part-3-domain-3</loc>
    <lastmod>2025-08-31T22:32:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/high-availability-and-system-resilience-domain-3</loc>
    <lastmod>2025-08-31T22:32:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/disaster-recovery-site-considerations-domain-3</loc>
    <lastmod>2025-08-31T22:32:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/platform-diversity-and-multi-cloud-architecture-domain-3</loc>
    <lastmod>2025-08-31T22:32:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/continuity-of-operations-and-capacity-planning-domain-3</loc>
    <lastmod>2025-08-31T22:32:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/comprehensive-testing-for-resilience-domain-3</loc>
    <lastmod>2025-08-31T22:31:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/backup-strategies-and-best-practices-part-1-domain-3</loc>
    <lastmod>2025-08-31T22:31:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/backup-strategies-and-best-practices-part-2-domain-3</loc>
    <lastmod>2025-08-31T22:31:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-recovery-techniques-domain-3</loc>
    <lastmod>2025-08-31T22:50:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/power-resilience-and-continuity-domain-3</loc>
    <lastmod>2025-08-31T22:49:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-domain-four-security-operations</loc>
    <lastmod>2025-08-31T22:49:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/secure-baselines-and-system-management-domain-4</loc>
    <lastmod>2025-08-31T22:49:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/hardening-computing-resources-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:49:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/hardening-computing-resources-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:49:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/hardening-embedded-systems-and-iot-devices-domain-4</loc>
    <lastmod>2025-08-31T22:49:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/securing-wireless-networks-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:49:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/securing-mobile-solutions-domain-4</loc>
    <lastmod>2025-08-31T22:49:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/securing-mobile-connectivity-domain-4</loc>
    <lastmod>2025-08-31T22:48:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/advanced-wireless-security-techniques-domain-4</loc>
    <lastmod>2025-08-31T22:48:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/application-security-essentials-domain-4</loc>
    <lastmod>2025-08-31T22:48:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/isolation-and-monitoring-techniques-domain-4</loc>
    <lastmod>2025-08-31T22:48:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/acquisition-and-procurement-security-domain-4</loc>
    <lastmod>2025-08-31T22:48:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/assignment-ownership-and-classification-domain-4</loc>
    <lastmod>2025-08-31T22:48:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/asset-monitoring-and-tracking-domain-4</loc>
    <lastmod>2025-08-31T22:47:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/secure-asset-disposal-and-decommissioning-domain-4</loc>
    <lastmod>2025-08-31T22:47:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-retention-and-secure-management-practices-domain-4</loc>
    <lastmod>2025-08-31T22:47:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-identification-methods-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:47:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-identification-methods-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:47:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/system-and-process-auditing-domain-4</loc>
    <lastmod>2025-08-31T22:47:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-analysis-and-prioritization-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:47:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-analysis-and-prioritization-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:46:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-response-and-remediation-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:46:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-response-and-remediation-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:46:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/validation-of-remediation-efforts-domain-4</loc>
    <lastmod>2025-08-31T22:46:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/effective-vulnerability-reporting-domain-4</loc>
    <lastmod>2025-08-31T22:43:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/monitoring-computing-resources-domain-4</loc>
    <lastmod>2025-08-31T22:43:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/key-security-monitoring-activities-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:43:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/key-security-monitoring-activities-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:43:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/alert-response-and-validation-domain-4</loc>
    <lastmod>2025-08-31T22:43:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-monitoring-tools-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:43:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-monitoring-tools-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:43:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/endpoint-and-data-security-monitoring-tools-domain-4</loc>
    <lastmod>2025-08-31T22:42:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/network-based-monitoring-tools-domain-4</loc>
    <lastmod>2025-08-31T22:42:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-scanning-tools-and-practices-domain-4</loc>
    <lastmod>2025-08-31T22:42:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/enhancing-firewall-capabilities-domain-4</loc>
    <lastmod>2025-08-31T22:42:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/enhancing-ids-ips-effectiveness-domain-4</loc>
    <lastmod>2025-08-31T22:42:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/web-filtering-and-content-security-domain-4</loc>
    <lastmod>2025-08-31T22:42:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/operating-system-security-enhancements-domain-4</loc>
    <lastmod>2025-08-31T22:42:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/secure-protocol-implementation-domain-4</loc>
    <lastmod>2025-08-31T22:42:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/dns-filtering-and-email-security-enhancements-domain-4</loc>
    <lastmod>2025-08-31T22:41:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/file-integrity-monitoring-and-data-loss-prevention-domain-4</loc>
    <lastmod>2025-08-31T22:41:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/network-access-control-and-endpoint-protection-domain-4</loc>
    <lastmod>2025-08-31T22:41:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/user-behavior-analytics-domain-4</loc>
    <lastmod>2025-08-31T22:41:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/user-account-provisioning-and-permission-management-domain-4</loc>
    <lastmod>2025-08-31T22:41:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/identity-proofing-and-federation-domain-4</loc>
    <lastmod>2025-08-31T22:41:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/single-sign-on-sso-and-protocols-domain-4</loc>
    <lastmod>2025-08-31T22:40:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/interoperability-and-attestation-domain-4</loc>
    <lastmod>2025-08-31T22:40:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/access-control-models-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:40:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/access-control-models-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:40:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/advanced-access-controls-and-least-privilege-domain-4</loc>
    <lastmod>2025-08-31T22:40:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/multifactor-authentication-mfa-implementations-domain-4</loc>
    <lastmod>2025-08-31T22:40:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/mfa-authentication-factors-domain-4</loc>
    <lastmod>2025-08-31T22:40:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/secure-password-management-domain-4</loc>
    <lastmod>2025-08-31T22:39:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/privileged-access-management-pam-domain-4</loc>
    <lastmod>2025-08-31T22:39:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/automation-and-scripting-in-security-domain-4</loc>
    <lastmod>2025-08-31T22:39:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/technical-debt-in-automation-domain-4</loc>
    <lastmod>2025-08-31T22:39:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/continuous-integration-and-api-automation-domain-4</loc>
    <lastmod>2025-08-31T22:39:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/benefits-of-security-automation-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:38:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/benefits-of-security-automation-part-2-domain-4</loc>
    <lastmod>2025-08-31T23:00:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/considerations-for-security-automation-part-1-domain-4</loc>
    <lastmod>2025-08-31T23:00:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/considerations-for-security-automation-part-2-domain-4</loc>
    <lastmod>2025-08-31T23:00:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/incident-response-process-part-1-domain-4</loc>
    <lastmod>2025-08-31T23:00:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/incident-response-process-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:59:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/incident-response-lessons-learned-domain-4</loc>
    <lastmod>2025-08-31T23:00:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/incident-response-training-and-testing-domain-4</loc>
    <lastmod>2025-08-31T22:59:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/root-cause-analysis-and-threat-hunting-domain-4</loc>
    <lastmod>2025-08-31T23:00:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/digital-forensics-foundations-domain-4</loc>
    <lastmod>2025-08-31T22:59:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/forensics-data-acquisition-and-reporting-domain-4</loc>
    <lastmod>2025-08-31T22:59:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/forensic-evidence-preservation-and-e-discovery-domain-4</loc>
    <lastmod>2025-08-31T22:58:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/leveraging-log-data-part-1-domain-4</loc>
    <lastmod>2025-08-31T22:58:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/leveraging-log-data-part-2-domain-4</loc>
    <lastmod>2025-08-31T22:58:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vulnerability-scan-data-and-automated-reporting-domain-4</loc>
    <lastmod>2025-08-31T22:58:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/dashboards-and-visualization-tools-domain-4</loc>
    <lastmod>2025-08-31T22:58:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/packet-captures-in-investigations-domain-4</loc>
    <lastmod>2025-08-31T22:58:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-domain-five-security-program-management-and-oversight</loc>
    <lastmod>2025-08-31T22:57:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/introduction-to-security-governance-domain-5</loc>
    <lastmod>2025-08-31T22:57:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/key-security-policies-and-standards-domain-5</loc>
    <lastmod>2025-08-31T22:57:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/incident-response-policies-and-procedures-domain-5</loc>
    <lastmod>2025-08-31T22:57:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-standards-and-physical-controls-domain-5</loc>
    <lastmod>2025-08-31T22:57:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/procedures-and-playbooks-domain-5</loc>
    <lastmod>2025-08-31T22:57:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/external-security-governance-considerations-domain-5</loc>
    <lastmod>2025-08-31T22:56:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/monitoring-and-revising-governance-policies-domain-5</loc>
    <lastmod>2025-08-31T22:56:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/governance-structures-and-roles-part-1-domain-5</loc>
    <lastmod>2025-08-31T22:56:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/governance-structures-and-roles-part-2-domain-5</loc>
    <lastmod>2025-08-31T22:56:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/risk-management-fundamentals-domain-5</loc>
    <lastmod>2025-08-31T22:56:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/conducting-risk-assessments-domain-5</loc>
    <lastmod>2025-08-31T22:56:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/risk-analysis-and-scoring-domain-5</loc>
    <lastmod>2025-08-31T22:56:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/risk-registers-and-key-risk-indicators-domain-5</loc>
    <lastmod>2025-08-31T22:55:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/risk-appetite-tolerance-and-thresholds-domain-5</loc>
    <lastmod>2025-08-31T22:55:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/risk-management-strategies-domain-5</loc>
    <lastmod>2025-08-31T22:55:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/risk-reporting-and-communication-domain-5</loc>
    <lastmod>2025-08-31T22:55:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/business-impact-analysis-domain-5</loc>
    <lastmod>2025-08-31T22:55:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/understanding-recovery-objectives-domain-5</loc>
    <lastmod>2025-08-31T22:55:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/mean-time-metrics-and-system-resilience-domain-5</loc>
    <lastmod>2025-08-31T22:55:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/vendor-risk-and-supply-chain-considerations-domain-5</loc>
    <lastmod>2025-08-31T22:54:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/agreement-types-and-contractual-security-domain-5</loc>
    <lastmod>2025-08-31T22:54:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/ongoing-vendor-monitoring-and-engagement-domain-5</loc>
    <lastmod>2025-08-31T22:54:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/effective-compliance-reporting-domain-5</loc>
    <lastmod>2025-08-31T22:54:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/consequences-of-non-compliance-domain-5</loc>
    <lastmod>2025-08-31T22:54:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/attestation-and-acknowledgement-in-compliance-domain-5</loc>
    <lastmod>2025-08-31T22:54:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/privacy-laws-and-global-compliance-domain-5</loc>
    <lastmod>2025-08-31T22:54:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-inventory-retention-and-the-right-to-be-forgotten-domain-5</loc>
    <lastmod>2025-08-31T22:53:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/privacy-and-legal-implications-of-compliance-domain-5</loc>
    <lastmod>2025-08-31T22:53:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/data-management-and-compliance-domain-5</loc>
    <lastmod>2025-08-31T22:53:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/attestation-and-internal-audits-domain-5</loc>
    <lastmod>2025-08-31T22:53:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/internal-audit-structures-domain-5</loc>
    <lastmod>2025-08-31T22:53:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/external-audits-and-assessments-domain-5</loc>
    <lastmod>2025-08-31T22:53:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/fundamentals-of-penetration-testing-domain-5</loc>
    <lastmod>2025-08-31T22:52:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/penetration-testing-environments-domain-5</loc>
    <lastmod>2025-08-31T22:52:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/reconnaissance-techniques-domain-5</loc>
    <lastmod>2025-08-31T22:52:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/effective-phishing-awareness-domain-5</loc>
    <lastmod>2025-08-31T22:52:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/anomalous-behavior-recognition-domain-5</loc>
    <lastmod>2025-08-31T22:52:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/user-guidance-and-training-part-1-domain-5</loc>
    <lastmod>2025-08-31T22:52:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/user-guidance-and-training-part-2-domain-5</loc>
    <lastmod>2025-08-31T22:52:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/user-guidance-and-training-part-3-domain-5</loc>
    <lastmod>2025-08-31T22:51:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/hybrid-and-remote-work-security-awareness-domain-5</loc>
    <lastmod>2025-08-31T22:51:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/security-reporting-and-monitoring-domain-5</loc>
    <lastmod>2025-08-31T22:51:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/developing-and-executing-security-awareness-programs-domain-5</loc>
    <lastmod>2025-08-31T22:51:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secplus.baremetalcyber.com/episodes/welcome-to-the-sec-audio-course</loc>
    <lastmod>2025-10-20T21:31:31Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
