<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//training.drdsecurity.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-threat-intelligence-analyst-ctia/lessons/lesson-2-1-overview-of-intelligence-lifecycle/</loc>
		<lastmod>2026-04-09T12:43:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-threat-intelligence-analyst-ctia/lessons/lesson-1-4-intelligence-vs-data-vs-information/</loc>
		<lastmod>2026-04-09T12:42:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-threat-intelligence-analyst-ctia/lessons/lesson-1-3-types-of-threat-intelligence/</loc>
		<lastmod>2026-04-09T12:42:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-threat-intelligence-analyst-ctia/lessons/lesson-1-2-importance-in-cybersecurity/</loc>
		<lastmod>2026-04-09T12:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-threat-intelligence-analyst-ctia/lessons/lesson-1-1-what-is-threat-intelligence/</loc>
		<lastmod>2026-04-09T12:42:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/final-evaluation/</loc>
		<lastmod>2026-04-09T12:36:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/presentation-submission/</loc>
		<lastmod>2026-04-09T12:36:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/analysis-reporting/</loc>
		<lastmod>2026-04-09T12:36:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/evidence-collection-2/</loc>
		<lastmod>2026-04-09T12:36:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/real-world-investigation-scenario/</loc>
		<lastmod>2026-04-09T12:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/case-closure/</loc>
		<lastmod>2026-04-09T12:36:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/legal-documentation/</loc>
		<lastmod>2026-04-09T12:36:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/expert-witness-testimony/</loc>
		<lastmod>2026-04-09T12:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/evidence-presentation/</loc>
		<lastmod>2026-04-09T12:35:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/writing-forensic-reports/</loc>
		<lastmod>2026-04-09T12:35:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/incident-reconstruction/</loc>
		<lastmod>2026-04-09T12:35:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/correlation-techniques/</loc>
		<lastmod>2026-04-09T12:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/timeline-creation/</loc>
		<lastmod>2026-04-09T12:35:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/siem-tools-basics/</loc>
		<lastmod>2026-04-09T12:35:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/log-sources-types/</loc>
		<lastmod>2026-04-09T12:35:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/case-studies/</loc>
		<lastmod>2026-04-09T12:34:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/challenges-in-iot-forensics/</loc>
		<lastmod>2026-04-09T12:34:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/smart-device-investigation/</loc>
		<lastmod>2026-04-09T12:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/data-sources-in-iot/</loc>
		<lastmod>2026-04-09T12:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/iot-architecture/</loc>
		<lastmod>2026-04-09T12:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/mobile-investigation-tools/</loc>
		<lastmod>2026-04-09T12:34:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/sim-call-records/</loc>
		<lastmod>2026-04-09T12:34:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/app-data-analysis/</loc>
		<lastmod>2026-04-09T12:34:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/data-extraction-techniques/</loc>
		<lastmod>2026-04-09T12:34:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/mobile-os-architecture-android-ios/</loc>
		<lastmod>2026-04-09T12:33:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/memory-artifacts/</loc>
		<lastmod>2026-04-09T12:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/rootkit-detection/</loc>
		<lastmod>2026-04-09T12:32:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/process-dll-analysis/</loc>
		<lastmod>2026-04-09T12:32:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/volatility-framework/</loc>
		<lastmod>2026-04-09T12:32:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/ram-acquisition/</loc>
		<lastmod>2026-04-09T12:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/reverse-engineering-basics/</loc>
		<lastmod>2026-04-09T12:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/sandbox-techniques/</loc>
		<lastmod>2026-04-09T12:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/dynamic-analysis/</loc>
		<lastmod>2026-04-09T12:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/static-analysis/</loc>
		<lastmod>2026-04-09T12:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/malware-types-behavior/</loc>
		<lastmod>2026-04-09T12:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/tools-for-email-forensics/</loc>
		<lastmod>2026-04-09T12:31:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/email-recovery/</loc>
		<lastmod>2026-04-09T12:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/phishing-investigation/</loc>
		<lastmod>2026-04-09T12:31:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/email-tracking-techniques/</loc>
		<lastmod>2026-04-09T12:31:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/email-headers-analysis/</loc>
		<lastmod>2026-04-09T12:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/incident-response-in-cloud/</loc>
		<lastmod>2026-04-09T12:31:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/challenges-in-cloud-forensics/</loc>
		<lastmod>2026-04-09T12:31:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/log-collection-in-cloud/</loc>
		<lastmod>2026-04-09T12:30:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/aws-azure-forensics/</loc>
		<lastmod>2026-04-09T12:30:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/cloud-architecture-basics/</loc>
		<lastmod>2026-04-09T12:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/evidence-extraction/</loc>
		<lastmod>2026-04-09T12:30:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/transaction-logs-analysis/</loc>
		<lastmod>2026-04-09T12:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/data-breach-investigation/</loc>
		<lastmod>2026-04-09T12:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/sql-server-mysql-forensics/</loc>
		<lastmod>2026-04-09T12:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/database-structure-logs/</loc>
		<lastmod>2026-04-09T12:30:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/incident-case-study/</loc>
		<lastmod>2026-04-09T12:29:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/web-shell-detection/</loc>
		<lastmod>2026-04-09T12:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/cross-site-scripting-xss/</loc>
		<lastmod>2026-04-09T12:29:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/sql-injection-evidence/</loc>
		<lastmod>2026-04-09T12:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/web-server-logs-analysis/</loc>
		<lastmod>2026-04-09T12:29:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/attack-reconstruction/</loc>
		<lastmod>2026-04-09T12:29:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/email-traffic-analysis/</loc>
		<lastmod>2026-04-09T12:29:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/intrusion-detection-logs/</loc>
		<lastmod>2026-04-09T12:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/packet-capture-wireshark/</loc>
		<lastmod>2026-04-09T12:29:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/network-traffic-analysis/</loc>
		<lastmod>2026-04-09T12:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/cross-platform-investigation/</loc>
		<lastmod>2026-04-09T12:28:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/macos-artifacts/</loc>
		<lastmod>2026-04-09T12:28:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/user-process-analysis/</loc>
		<lastmod>2026-04-09T12:28:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/log-file-investigation/</loc>
		<lastmod>2026-04-09T12:28:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/linux-file-system-analysis/</loc>
		<lastmod>2026-04-09T12:28:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/windows-timeline-reconstruction/</loc>
		<lastmod>2026-04-09T12:28:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/file-folder-analysis/</loc>
		<lastmod>2026-04-09T12:28:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/user-activity-tracking/</loc>
		<lastmod>2026-04-09T12:28:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/event-logs-investigation/</loc>
		<lastmod>2026-04-09T12:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/windows-artifacts-registry-analysis/</loc>
		<lastmod>2026-04-09T12:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/write-blockers-best-practices/</loc>
		<lastmod>2026-04-09T12:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/hashing-integrity-verification/</loc>
		<lastmod>2026-04-09T12:27:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/forensic-tools-ftk-imager-dd/</loc>
		<lastmod>2026-04-09T12:27:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/live-vs-dead-acquisition/</loc>
		<lastmod>2026-04-09T12:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/disk-imaging-techniques/</loc>
		<lastmod>2026-04-09T12:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/slack-space-unallocated-space/</loc>
		<lastmod>2026-04-09T12:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/data-recovery-concepts/</loc>
		<lastmod>2026-04-09T12:26:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/partitioning-boot-process/</loc>
		<lastmod>2026-04-09T12:26:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/file-systems-fat-ntfs-ext/</loc>
		<lastmod>2026-04-09T12:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/disk-structure-storage-basics/</loc>
		<lastmod>2026-04-09T12:26:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/forensic-readiness-planning/</loc>
		<lastmod>2026-04-09T12:26:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/documentation-reporting/</loc>
		<lastmod>2026-04-09T12:26:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/evidence-preservation/</loc>
		<lastmod>2026-04-09T12:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/evidence-collection-techniques/</loc>
		<lastmod>2026-04-09T12:26:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/evidence-identification/</loc>
		<lastmod>2026-04-09T12:26:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/legal-ethical-considerations-2/</loc>
		<lastmod>2026-04-09T12:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/chain-of-custody-2/</loc>
		<lastmod>2026-04-09T12:25:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/forensic-investigation-process/</loc>
		<lastmod>2026-04-09T12:25:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/cybercrime-investigation-types/</loc>
		<lastmod>2026-04-09T12:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/computer-hacking-forensic-investigator-chfi/lessons/what-is-digital-forensics/</loc>
		<lastmod>2026-04-09T12:25:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-12-4-final-review-and-certification-prep/</loc>
		<lastmod>2026-04-09T12:14:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-12-3-monitoring-and-detection-for-app-attacks/</loc>
		<lastmod>2026-04-09T12:14:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-12-2-hardening-checklists-for-production-apps/</loc>
		<lastmod>2026-04-09T12:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-12-1-secure-sdlc-for-web-applications/</loc>
		<lastmod>2026-04-09T12:13:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-11-4-retesting-and-closure/</loc>
		<lastmod>2026-04-09T12:12:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-11-3-communicating-with-developers-and-stakeholders/</loc>
		<lastmod>2026-04-09T12:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-11-2-severity-and-risk-rating/</loc>
		<lastmod>2026-04-09T12:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-11-1-writing-effective-vulnerability-reports/</loc>
		<lastmod>2026-04-09T12:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-10-4-lab-based-assessment-walkthrough/</loc>
		<lastmod>2026-04-09T12:11:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-10-3-organizing-findings-during-assessment/</loc>
		<lastmod>2026-04-09T12:11:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-10-2-automation-in-web-security-testing/</loc>
		<lastmod>2026-04-09T12:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-10-1-interception-and-inspection-tools/</loc>
		<lastmod>2026-04-09T12:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-9-4-defensive-workflow-design/</loc>
		<lastmod>2026-04-09T12:10:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-9-3-multi-step-function-abuse/</loc>
		<lastmod>2026-04-09T12:10:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-9-2-testing-complex-workflows/</loc>
		<lastmod>2026-04-09T11:59:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-9-1-what-business-logic-flaws-are/</loc>
		<lastmod>2026-04-09T11:58:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-8-4-api-hardening-best-practices/</loc>
		<lastmod>2026-04-09T11:58:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-8-3-single-page-applications-and-client-logic/</loc>
		<lastmod>2026-04-09T11:58:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-8-2-testing-api-authorization-and-input-handling/</loc>
		<lastmod>2026-04-09T11:57:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-8-1-api-security-fundamentals/</loc>
		<lastmod>2026-04-09T11:57:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-7-4-hardening-file-management-features/</loc>
		<lastmod>2026-04-09T11:57:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-7-3-download-and-export-functionality-review/</loc>
		<lastmod>2026-04-09T11:57:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-7-2-sensitive-data-exposure/</loc>
		<lastmod>2026-04-09T11:57:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-7-1-file-upload-risks/</loc>
		<lastmod>2026-04-09T11:56:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-6-4-xss-prevention-strategies/</loc>
		<lastmod>2026-04-09T11:56:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-6-3-browser-security-mechanisms/</loc>
		<lastmod>2026-04-09T11:56:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-6-2-input-reflection-and-output-contexts/</loc>
		<lastmod>2026-04-09T11:56:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-6-1-client-side-attack-surface/</loc>
		<lastmod>2026-04-09T11:56:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-5-4-secure-coding-and-defensive-controls/</loc>
		<lastmod>2026-04-09T11:55:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-5-3-testing-inputs-safely-in-labs/</loc>
		<lastmod>2026-04-09T11:55:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-5-2-injection-vulnerability-overview/</loc>
		<lastmod>2026-04-09T11:55:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-5-1-input-validation-fundamentals/</loc>
		<lastmod>2026-04-09T11:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-4-4-defensive-authorization-design/</loc>
		<lastmod>2026-04-09T11:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-4-3-multi-user-testing-strategy/</loc>
		<lastmod>2026-04-09T11:54:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-4-2-broken-access-control-concepts/</loc>
		<lastmod>2026-04-09T11:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-4-1-understanding-authorization-models/</loc>
		<lastmod>2026-04-09T11:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-3-4-hardening-authentication-flows/</loc>
		<lastmod>2026-04-09T11:54:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-3-3-session-management-risks/</loc>
		<lastmod>2026-04-09T11:53:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-3-2-common-authentication-weaknesses/</loc>
		<lastmod>2026-04-09T11:53:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-3-1-authentication-mechanisms/</loc>
		<lastmod>2026-04-09T11:53:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-2-4-building-a-testing-methodology/</loc>
		<lastmod>2026-04-09T11:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-2-3-parameters-inputs-and-user-roles/</loc>
		<lastmod>2026-04-09T11:53:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-2-2-content-discovery-and-endpoint-mapping/</loc>
		<lastmod>2026-04-09T11:53:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-2-1-information-gathering-for-web-apps/</loc>
		<lastmod>2026-04-09T11:52:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-1-4-web-architecture-and-attack-surface-mapping/</loc>
		<lastmod>2026-04-09T11:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-1-3-http-https-fundamentals/</loc>
		<lastmod>2026-04-09T11:52:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-1-2-how-web-applications-work/</loc>
		<lastmod>2026-04-09T11:52:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/web-application-hacking-security/lessons/lesson-1-1-course-overview-and-ethical-boundaries/</loc>
		<lastmod>2026-04-09T11:52:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/presentation-review/</loc>
		<lastmod>2026-04-09T11:46:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/vulnerability-assessment-report/</loc>
		<lastmod>2026-04-09T11:46:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/real-world-penetration-testing-simulation/</loc>
		<lastmod>2026-04-09T11:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/real-world-case-study/</loc>
		<lastmod>2026-04-09T11:46:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/reporting-documentation-2/</loc>
		<lastmod>2026-04-09T11:46:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/methodologies-ptes-owasp/</loc>
		<lastmod>2026-04-09T11:46:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/penetration-testing-phases/</loc>
		<lastmod>2026-04-09T11:46:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/hashing-techniques/</loc>
		<lastmod>2026-04-09T11:46:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/public-key-infrastructure-pki-2/</loc>
		<lastmod>2026-04-09T11:45:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/encryption-algorithms/</loc>
		<lastmod>2026-04-09T11:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/cryptography-basics/</loc>
		<lastmod>2026-04-09T11:45:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-aircrack-ng/</loc>
		<lastmod>2026-04-09T11:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/wpa-wpa2-cracking/</loc>
		<lastmod>2026-04-09T11:45:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/wireless-attacks/</loc>
		<lastmod>2026-04-09T11:45:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/wireless-standards-security/</loc>
		<lastmod>2026-04-09T11:45:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/prevention-methods/</loc>
		<lastmod>2026-04-09T11:45:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/exploitation-techniques/</loc>
		<lastmod>2026-04-09T11:44:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/types-of-sql-injection/</loc>
		<lastmod>2026-04-09T11:44:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/sql-injection-basics-2/</loc>
		<lastmod>2026-04-09T11:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-burp-suite-nikto/</loc>
		<lastmod>2026-04-09T11:31:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/owasp-top-10/</loc>
		<lastmod>2026-04-09T11:31:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/web-application-vulnerabilities/</loc>
		<lastmod>2026-04-09T11:31:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/web-server-attacks/</loc>
		<lastmod>2026-04-09T11:31:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/web-server-architecture/</loc>
		<lastmod>2026-04-09T11:31:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/countermeasures-2/</loc>
		<lastmod>2026-04-09T11:31:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/session-hijacking-techniques/</loc>
		<lastmod>2026-04-09T11:31:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/session-management-basics/</loc>
		<lastmod>2026-04-09T11:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/prevention-strategies/</loc>
		<lastmod>2026-04-09T11:30:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/botnets/</loc>
		<lastmod>2026-04-09T11:30:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/attack-techniques/</loc>
		<lastmod>2026-04-09T11:30:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/dos-ddos-concepts/</loc>
		<lastmod>2026-04-09T11:30:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-wireshark-ettercap/</loc>
		<lastmod>2026-04-09T11:30:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/social-engineering-techniques/</loc>
		<lastmod>2026-04-09T11:30:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/mitm-attacks/</loc>
		<lastmod>2026-04-09T11:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/packet-sniffing-basics/</loc>
		<lastmod>2026-04-09T11:29:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/countermeasures/</loc>
		<lastmod>2026-04-09T11:29:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/trojans-viruses-worms/</loc>
		<lastmod>2026-04-09T11:29:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/malware-analysis-basics/</loc>
		<lastmod>2026-04-09T11:29:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/types-of-malware/</loc>
		<lastmod>2026-04-09T11:29:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-john-the-ripper-hydra/</loc>
		<lastmod>2026-04-09T11:29:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/covering-tracks/</loc>
		<lastmod>2026-04-09T11:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/maintaining-access/</loc>
		<lastmod>2026-04-09T11:29:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/privilege-escalation/</loc>
		<lastmod>2026-04-09T11:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/password-cracking-techniques/</loc>
		<lastmod>2026-04-09T11:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-and-techniques/</loc>
		<lastmod>2026-04-09T11:28:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/ldap-enumeration/</loc>
		<lastmod>2026-04-09T11:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/netbios-snmp-enumeration/</loc>
		<lastmod>2026-04-09T11:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/enumeration-concepts/</loc>
		<lastmod>2026-04-09T11:27:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/banner-grabbing/</loc>
		<lastmod>2026-04-09T11:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-nmap-nessus/</loc>
		<lastmod>2026-04-09T11:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/vulnerability-scanning/</loc>
		<lastmod>2026-04-09T11:27:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/port-scanning-techniques/</loc>
		<lastmod>2026-04-09T11:27:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/network-scanning-fundamentals/</loc>
		<lastmod>2026-04-09T11:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/tools-maltego-recon-ng/</loc>
		<lastmod>2026-04-09T11:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/social-media-intelligence-gathering/</loc>
		<lastmod>2026-04-09T11:27:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/whois-dns-enumeration/</loc>
		<lastmod>2026-04-09T11:26:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-ethical-hacker-ceh-master/lessons/google-dorking-techniques/</loc>
		<lastmod>2026-04-09T11:26:51+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->