<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//training.drdsecurity.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/incident-detection-response/</loc>
		<lastmod>2026-04-06T14:58:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/log-analysis-monitoring/</loc>
		<lastmod>2026-04-06T14:58:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/siem-tools-overview-splunk-basics/</loc>
		<lastmod>2026-04-06T14:58:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/what-is-a-soc/</loc>
		<lastmod>2026-04-06T14:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/using-burp-suite-hands-on/</loc>
		<lastmod>2026-04-06T14:58:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/xss-cross-site-scripting/</loc>
		<lastmod>2026-04-06T14:58:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/sql-injection-basics/</loc>
		<lastmod>2026-04-06T14:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/owasp-top-10-overview/</loc>
		<lastmod>2026-04-06T14:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/how-web-applications-work/</loc>
		<lastmod>2026-04-06T14:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/introduction-to-metasploit-2/</loc>
		<lastmod>2026-04-06T14:57:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/exploitation-concepts/</loc>
		<lastmod>2026-04-06T14:57:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/vulnerability-scanning-basics/</loc>
		<lastmod>2026-04-06T14:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/scanning-with-nmap-hands-on/</loc>
		<lastmod>2026-04-06T14:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/reconnaissance-techniques/</loc>
		<lastmod>2026-04-06T14:57:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/introduction-to-ethical-hacking/</loc>
		<lastmod>2026-04-06T14:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/package-management-tools-installation/</loc>
		<lastmod>2026-04-06T14:56:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/essential-linux-commands/</loc>
		<lastmod>2026-04-06T14:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/linux-file-system-permissions/</loc>
		<lastmod>2026-04-06T14:56:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/kali-linux-setup/</loc>
		<lastmod>2026-04-06T14:56:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/introduction-to-linux/</loc>
		<lastmod>2026-04-06T14:56:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/security-policies-best-practices/</loc>
		<lastmod>2026-04-06T14:56:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/social-engineering-attacks-2/</loc>
		<lastmod>2026-04-06T14:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/malware-types-virus-trojan-ransomware/</loc>
		<lastmod>2026-04-06T14:55:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/types-of-cyber-threats-attacks/</loc>
		<lastmod>2026-04-06T14:55:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/cia-triad-confidentiality-integrity-availability-2/</loc>
		<lastmod>2026-04-06T14:55:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/wireshark-introduction-hands-on/</loc>
		<lastmod>2026-04-06T14:55:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/network-devices-router-switch-firewall/</loc>
		<lastmod>2026-04-06T14:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/dns-dhcp-http-https/</loc>
		<lastmod>2026-04-06T14:55:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/ip-addressing-subnetting-basics-2/</loc>
		<lastmod>2026-04-06T14:55:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/osi-tcp-ip-models/</loc>
		<lastmod>2026-04-06T14:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/what-is-networking-2/</loc>
		<lastmod>2026-04-06T14:55:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/installing-virtual-machines-hands-on/</loc>
		<lastmod>2026-04-06T14:54:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/command-line-basics-cmd-bash/</loc>
		<lastmod>2026-04-06T14:54:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/file-systems-processes/</loc>
		<lastmod>2026-04-06T14:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/operating-systems-windows-linux-basics/</loc>
		<lastmod>2026-04-06T14:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/how-computers-work-hardware-basics/</loc>
		<lastmod>2026-04-06T14:54:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/skills-vs-certifications-vs-experience/</loc>
		<lastmod>2026-04-06T14:54:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/cybersecurity-career-roadmap-step-by-step/</loc>
		<lastmod>2026-04-06T14:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/job-roles-in-cybersecurity/</loc>
		<lastmod>2026-04-06T14:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/cybersecurity-domains-overview-blue-red-purple-team/</loc>
		<lastmod>2026-04-06T14:54:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/zero-to-cybersecurity-job-roadmap/lessons/what-is-cybersecurity-2/</loc>
		<lastmod>2026-04-06T14:53:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-9-4-career-roadmap/</loc>
		<lastmod>2026-04-06T14:47:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-9-3-building-a-lab-setup/</loc>
		<lastmod>2026-04-06T14:47:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-9-2-certifications-chfi-ceh-etc/</loc>
		<lastmod>2026-04-06T14:47:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-9-1-job-roles-opportunities/</loc>
		<lastmod>2026-04-06T14:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-8-4-final-assessment/</loc>
		<lastmod>2026-04-06T14:46:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-8-3-report-writing-practice/</loc>
		<lastmod>2026-04-06T14:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-8-2-step-by-step-investigation-demo/</loc>
		<lastmod>2026-04-06T14:46:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-8-1-real-world-cyber-crime-case-study/</loc>
		<lastmod>2026-04-06T14:46:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-7-4-reporting-standards/</loc>
		<lastmod>2026-04-06T14:46:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-7-3-ethical-considerations/</loc>
		<lastmod>2026-04-06T14:46:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-7-2-admissibility-of-digital-evidence/</loc>
		<lastmod>2026-04-06T14:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-7-1-cyber-laws-overview/</loc>
		<lastmod>2026-04-06T14:45:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-6-4-detecting-suspicious-activity/</loc>
		<lastmod>2026-04-06T14:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-6-3-introduction-to-wireshark/</loc>
		<lastmod>2026-04-06T14:45:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-6-2-basics-of-network-traffic-analysis/</loc>
		<lastmod>2026-04-06T14:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-6-1-understanding-logs-system-application/</loc>
		<lastmod>2026-04-06T14:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-5-4-open-source-vs-commercial-tools/</loc>
		<lastmod>2026-04-06T14:45:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-5-3-encase-overview/</loc>
		<lastmod>2026-04-06T14:45:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-5-2-basics-of-ftk-forensic-toolkit/</loc>
		<lastmod>2026-04-06T14:45:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-5-1-introduction-to-autopsy-tool/</loc>
		<lastmod>2026-04-06T14:44:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-4-4-introduction-to-data-carving/</loc>
		<lastmod>2026-04-06T14:44:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-4-3-disk-imaging-techniques/</loc>
		<lastmod>2026-04-06T14:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-4-2-deleted-file-recovery-concepts/</loc>
		<lastmod>2026-04-06T14:44:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-4-1-basics-of-file-systems-fat-ntfs/</loc>
		<lastmod>2026-04-06T14:44:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-3-4-analysis-reporting/</loc>
		<lastmod>2026-04-06T14:44:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-3-3-data-acquisition-methods/</loc>
		<lastmod>2026-04-06T14:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-3-2-preservation-techniques/</loc>
		<lastmod>2026-04-06T14:44:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-3-1-identification-phase/</loc>
		<lastmod>2026-04-06T14:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-2-4-evidence-handling-best-practices/</loc>
		<lastmod>2026-04-06T14:43:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-2-3-chain-of-custody/</loc>
		<lastmod>2026-04-06T14:43:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-2-2-volatile-vs-non-volatile-data/</loc>
		<lastmod>2026-04-06T14:42:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-2-1-types-of-digital-evidence/</loc>
		<lastmod>2026-04-06T14:42:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-1-4-cyber-forensics-vs-cyber-security/</loc>
		<lastmod>2026-04-06T14:42:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-1-3-types-of-cyber-crimes/</loc>
		<lastmod>2026-04-06T14:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-1-2-importance-of-digital-evidence/</loc>
		<lastmod>2026-04-06T14:42:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-cyber-forensics-basics/lessons/lesson-1-1-what-is-cyber-forensics/</loc>
		<lastmod>2026-04-06T14:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-9-2-report-submission/</loc>
		<lastmod>2026-04-06T09:30:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-9-1-simulated-penetration-test/</loc>
		<lastmod>2026-04-06T09:30:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-8-3-reporting-documentation/</loc>
		<lastmod>2026-04-06T09:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-8-2-maintaining-access-conceptual/</loc>
		<lastmod>2026-04-06T09:29:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-8-1-post-exploitation-basics/</loc>
		<lastmod>2026-04-06T09:29:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-7-3-cross-site-scripting-xss/</loc>
		<lastmod>2026-04-06T09:29:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-7-2-sql-injection-basics/</loc>
		<lastmod>2026-04-06T09:28:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-7-1-owasp-top-10-overview/</loc>
		<lastmod>2026-04-06T09:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-6-3-gaining-access/</loc>
		<lastmod>2026-04-06T09:28:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-6-2-using-metasploit-framework/</loc>
		<lastmod>2026-04-06T09:27:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-6-1-introduction-to-exploits/</loc>
		<lastmod>2026-04-06T09:27:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-5-3-vulnerability-scanning/</loc>
		<lastmod>2026-04-06T09:27:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-5-2-service-enumeration/</loc>
		<lastmod>2026-04-06T09:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-5-1-network-scanning-with-nmap/</loc>
		<lastmod>2026-04-06T09:26:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-4-3-dns-subdomain-enumeration/</loc>
		<lastmod>2026-04-06T09:26:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-4-1-passive-reconnaissance/</loc>
		<lastmod>2026-04-06T09:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-4-2-active-reconnaissance/</loc>
		<lastmod>2026-04-06T09:25:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-3-3-basic-linux-commands/</loc>
		<lastmod>2026-04-06T09:24:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-3-2-lab-configuration/</loc>
		<lastmod>2026-04-06T09:24:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-3-1-installing-kali-linux/</loc>
		<lastmod>2026-04-06T09:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-2-3-scanning-enumeration/</loc>
		<lastmod>2026-04-06T09:24:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-2-2-reconnaissance-phase/</loc>
		<lastmod>2026-04-06T09:23:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-2-1-overview-of-ptes/</loc>
		<lastmod>2026-04-06T09:23:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-1-3-legal-ethical-considerations/</loc>
		<lastmod>2026-04-06T09:22:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-1-2-types-of-penetration-testing/</loc>
		<lastmod>2026-04-06T09:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/introduction-to-penetration-testing/lessons/lesson-1-1-what-is-penetration-testing/</loc>
		<lastmod>2026-04-06T09:21:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/security-policies-awareness/</loc>
		<lastmod>2026-04-06T06:37:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/backup-and-recovery/</loc>
		<lastmod>2026-04-06T06:37:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/risk-management-basics/</loc>
		<lastmod>2026-04-06T06:37:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/steps-in-incident-handling/</loc>
		<lastmod>2026-04-06T06:37:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/what-is-incident-response/</loc>
		<lastmod>2026-04-06T06:37:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/best-practices-for-network-hardening/</loc>
		<lastmod>2026-04-06T06:37:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/secure-wireless-networks/</loc>
		<lastmod>2026-04-06T06:36:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/zero-trust-security-model/</loc>
		<lastmod>2026-04-06T06:36:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/dmz-demilitarized-zone/</loc>
		<lastmod>2026-04-06T06:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/network-segmentation/</loc>
		<lastmod>2026-04-06T06:36:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/siem-overview/</loc>
		<lastmod>2026-04-06T06:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/log-analysis-basics/</loc>
		<lastmod>2026-04-06T06:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/network-scanning-with-nmap/</loc>
		<lastmod>2026-04-06T06:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/packet-analysis-using-wireshark/</loc>
		<lastmod>2026-04-06T06:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/introduction-to-network-monitoring/</loc>
		<lastmod>2026-04-06T06:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/public-key-infrastructure-pki/</loc>
		<lastmod>2026-04-06T06:35:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/vpn-types-and-use-cases/</loc>
		<lastmod>2026-04-06T06:35:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/ssl-tls-and-https/</loc>
		<lastmod>2026-04-06T06:35:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/symmetric-vs-asymmetric-encryption/</loc>
		<lastmod>2026-04-06T06:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/basics-of-cryptography/</loc>
		<lastmod>2026-04-06T06:35:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/endpoint-security-basics/</loc>
		<lastmod>2026-04-06T06:34:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/network-access-control-nac/</loc>
		<lastmod>2026-04-06T06:34:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/proxy-servers/</loc>
		<lastmod>2026-04-06T06:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/ids-vs-ips/</loc>
		<lastmod>2026-04-06T06:34:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/firewalls-types-and-working/</loc>
		<lastmod>2026-04-06T06:34:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/introduction-to-cve-security-databases/</loc>
		<lastmod>2026-04-06T06:34:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/vulnerabilities-and-exploits/</loc>
		<lastmod>2026-04-06T06:34:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/social-engineering-attacks/</loc>
		<lastmod>2026-04-06T06:33:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/malware-types-virus-worm-trojan-ransomware/</loc>
		<lastmod>2026-04-06T06:33:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/types-of-network-attacks-mitm-dos-ddos/</loc>
		<lastmod>2026-04-06T06:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/ports-and-services-http-https-ftp-ssh/</loc>
		<lastmod>2026-04-06T06:33:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/common-network-devices-router-switch-firewall/</loc>
		<lastmod>2026-04-06T06:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/ip-addressing-subnetting-basics/</loc>
		<lastmod>2026-04-06T06:33:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/tcp-ip-model-and-protocols/</loc>
		<lastmod>2026-04-06T06:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/osi-model-explained-security-perspective/</loc>
		<lastmod>2026-04-06T06:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/real-world-cyber-attacks-case-studies-2/</loc>
		<lastmod>2026-04-06T06:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/cia-triad-confidentiality-integrity-availability/</loc>
		<lastmod>2026-04-06T06:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/types-of-cyber-threats-malware-phishing-dos/</loc>
		<lastmod>2026-04-06T06:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/importance-of-cybersecurity-in-modern-networks/</loc>
		<lastmod>2026-04-06T06:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/network-security/lessons/what-is-network-security/</loc>
		<lastmod>2026-04-06T06:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-10-2-security-checklist-implementation/</loc>
		<lastmod>2026-04-06T06:24:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-10-1-real-life-cyber-attack-simulation/</loc>
		<lastmod>2026-04-06T06:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-9-4-government-helplines-portals/</loc>
		<lastmod>2026-04-06T06:24:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-9-3-legal-rights-safety/</loc>
		<lastmod>2026-04-06T06:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-9-2-cyber-crime-reporting-process/</loc>
		<lastmod>2026-04-06T06:24:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-9-1-it-act-overview/</loc>
		<lastmod>2026-04-06T06:24:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-8-4-live-demo-detecting-threats/</loc>
		<lastmod>2026-04-06T06:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-8-3-password-managers/</loc>
		<lastmod>2026-04-06T06:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-8-2-vpn-privacy-tools/</loc>
		<lastmod>2026-04-06T06:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-8-1-antivirus-security-tools/</loc>
		<lastmod>2026-04-06T06:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-7-4-legal-ethical-guidelines/</loc>
		<lastmod>2026-04-06T06:23:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-7-3-basic-hacking-concepts-demo/</loc>
		<lastmod>2026-04-06T06:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-7-2-types-of-hackers/</loc>
		<lastmod>2026-04-06T06:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-7-1-what-is-ethical-hacking/</loc>
		<lastmod>2026-04-06T06:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-6-4-public-wi-fi-risks/</loc>
		<lastmod>2026-04-06T06:22:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-6-3-two-factor-authentication-2fa/</loc>
		<lastmod>2026-04-06T06:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-6-2-secure-password-practices/</loc>
		<lastmod>2026-04-06T06:22:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-6-1-identifying-fake-websites/</loc>
		<lastmod>2026-04-06T06:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-5-4-safe-online-transactions/</loc>
		<lastmod>2026-04-06T06:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-5-3-otp-sim-swap-fraud/</loc>
		<lastmod>2026-04-06T06:22:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-5-2-atm-banking-scams/</loc>
		<lastmod>2026-04-06T06:21:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-5-1-upi-frauds-explained/</loc>
		<lastmod>2026-04-06T06:21:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-4-4-recovery-prevention-steps/</loc>
		<lastmod>2026-04-06T06:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-4-3-account-hacking-techniques/</loc>
		<lastmod>2026-04-06T06:21:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-4-2-password-privacy-settings/</loc>
		<lastmod>2026-04-06T06:21:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-4-1-facebook-instagram-security/</loc>
		<lastmod>2026-04-06T06:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-3-4-how-hackers-target-mobile-users/</loc>
		<lastmod>2026-04-06T06:19:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-3-3-safe-browsing-on-mobile/</loc>
		<lastmod>2026-04-06T06:19:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-3-2-app-permissions-risks/</loc>
		<lastmod>2026-04-06T06:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-3-1-android-security-basics/</loc>
		<lastmod>2026-04-06T06:19:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-2-4-real-cyber-crime-cases-in-india/</loc>
		<lastmod>2026-04-06T06:18:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-2-3-social-engineering-attacks/</loc>
		<lastmod>2026-04-06T06:18:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-2-2-malware-virus-ransomwar/</loc>
		<lastmod>2026-04-06T06:18:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-2-1-phishing-email-scams/</loc>
		<lastmod>2026-04-06T06:18:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-1-3-types-of-cyber-threats-overview/</loc>
		<lastmod>2026-04-01T09:01:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-1-2-importance-in-daily-life-india-context/</loc>
		<lastmod>2026-04-01T09:01:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-1-1-what-is-cyber-security/</loc>
		<lastmod>2026-04-01T09:01:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-8-installing-kali-linux-demo/</loc>
		<lastmod>2026-04-01T08:58:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-7-virtualbox-setup/</loc>
		<lastmod>2026-04-01T08:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-6-how-internet-works/</loc>
		<lastmod>2026-04-01T08:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-5-osi-model-explained-simply/</loc>
		<lastmod>2026-04-01T08:57:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/cyber-%e0%a4%b8%e0%a5%81%e0%a4%b0%e0%a4%95%e0%a5%8d%e0%a4%b7%e0%a4%be-complete-cyber-safety-course/lessons/lesson-4-basics-of-networking/</loc>
		<lastmod>2026-04-01T08:57:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/how-to-practice-safely/</loc>
		<lastmod>2026-04-01T08:44:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/tools-you-should-learn-next/</loc>
		<lastmod>2026-04-01T08:44:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/certifications-guide-ceh-security-etc/</loc>
		<lastmod>2026-04-01T08:44:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/cybersecurity-career-options/</loc>
		<lastmod>2026-04-01T08:44:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/system-hardening-basics/</loc>
		<lastmod>2026-04-01T08:44:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/secure-password-practices/</loc>
		<lastmod>2026-04-01T08:43:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/firewalls-antivirus-basics/</loc>
		<lastmod>2026-04-01T08:43:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/how-to-prevent-attacks/</loc>
		<lastmod>2026-04-01T08:43:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/post-exploitation-basics/</loc>
		<lastmod>2026-04-01T08:43:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/exploiting-a-simple-vulnerability-demo/</loc>
		<lastmod>2026-04-01T08:43:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/introduction-to-metasploit/</loc>
		<lastmod>2026-04-01T08:42:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/what-is-exploitation/</loc>
		<lastmod>2026-04-01T08:42:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/real-world-examples/</loc>
		<lastmod>2026-04-01T08:42:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/vulnerability-scanning-tools-overview/</loc>
		<lastmod>2026-04-01T08:42:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/ethical-hacking-basics-hands-on-intro/lessons/common-vulnerabilities-sqli-xss-etc/</loc>
		<lastmod>2026-04-01T08:42:20+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->