<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//training.drdsecurity.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/advanced-sql-injection-blind-time-based/</loc>
		<lastmod>2026-04-09T07:40:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/owasp-top-10-deep-dive/</loc>
		<lastmod>2026-04-09T07:40:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/payload-creation-obfuscation/</loc>
		<lastmod>2026-04-09T07:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/exploit-development-basics/</loc>
		<lastmod>2026-04-09T07:39:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/buffer-overflow-exploitation-hands-on/</loc>
		<lastmod>2026-04-09T07:39:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/manual-exploitation-techniques/</loc>
		<lastmod>2026-04-09T07:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/exploitation-frameworks-metasploit-advanced-usage/</loc>
		<lastmod>2026-04-09T07:39:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/evading-ids-ips-detection/</loc>
		<lastmod>2026-04-09T07:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/banner-grabbing-fingerprinting/</loc>
		<lastmod>2026-04-09T07:35:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/vulnerability-scanning-nessus-openvas/</loc>
		<lastmod>2026-04-09T07:34:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/service-enumeration-smb-snmp-ldap-ftp/</loc>
		<lastmod>2026-04-09T07:34:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/network-mapping-advanced-nmap-techniques/</loc>
		<lastmod>2026-04-09T07:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/automation-tools-amass-recon-ng-maltego/</loc>
		<lastmod>2026-04-09T07:34:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/social-engineering-recon-techniques/</loc>
		<lastmod>2026-04-09T07:34:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/dns-enumeration-subdomain-takeover/</loc>
		<lastmod>2026-04-09T07:33:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/advanced-google-dorking-metadata-extraction/</loc>
		<lastmod>2026-04-09T07:33:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/passive-reconnaissance-osint-deep-dive/</loc>
		<lastmod>2026-04-09T07:33:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/lab-setup-environment-configuration/</loc>
		<lastmod>2026-04-09T07:29:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/red-team-vs-blue-team-vs-purple-team/</loc>
		<lastmod>2026-04-09T07:29:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/rules-of-engagement-legal-framework/</loc>
		<lastmod>2026-04-09T07:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/penetration-testing-standards-ptes-owasp-nist/</loc>
		<lastmod>2026-04-09T07:28:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/licensed-penetration-tester-lpt-master/lessons/lpt-master-certification-overview/</loc>
		<lastmod>2026-04-09T07:28:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/final-revision/</loc>
		<lastmod>2026-04-09T07:17:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/tips-strategies/</loc>
		<lastmod>2026-04-09T07:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/mock-exams/</loc>
		<lastmod>2026-04-09T07:16:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/practice-questions/</loc>
		<lastmod>2026-04-09T07:16:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/exam-overview-ec-council-cdsoe/</loc>
		<lastmod>2026-04-09T07:16:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/final-submission-review/</loc>
		<lastmod>2026-04-09T07:16:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/perform-testing-monitoring/</loc>
		<lastmod>2026-04-09T07:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/implement-security-controls/</loc>
		<lastmod>2026-04-09T07:15:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/setup-devops-environment/</loc>
		<lastmod>2026-04-09T07:15:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/project-brief-secure-ci-cd-pipeline/</loc>
		<lastmod>2026-04-09T07:15:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/case-study/</loc>
		<lastmod>2026-04-09T07:15:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/devsecops-maturity-model/</loc>
		<lastmod>2026-04-09T07:15:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/automation-best-practices/</loc>
		<lastmod>2026-04-09T07:14:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/toolchain-integration-strategy/</loc>
		<lastmod>2026-04-09T07:14:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/building-devsecops-pipelines/</loc>
		<lastmod>2026-04-09T07:14:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/devsecops-governance-models/</loc>
		<lastmod>2026-04-09T07:14:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/auditing-reporting/</loc>
		<lastmod>2026-04-09T07:14:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/compliance-automation/</loc>
		<lastmod>2026-04-09T07:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/policy-as-code/</loc>
		<lastmod>2026-04-09T07:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/regulatory-standards-iso-gdpr-pci-dss/</loc>
		<lastmod>2026-04-09T07:13:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/siem-basics/</loc>
		<lastmod>2026-04-09T07:13:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/incident-detection-response-2/</loc>
		<lastmod>2026-04-09T07:12:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/security-logging/</loc>
		<lastmod>2026-04-09T07:12:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/tools-elk-stack-prometheus-grafana/</loc>
		<lastmod>2026-04-09T07:12:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/importance-of-monitoring/</loc>
		<lastmod>2026-04-09T07:12:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/ci-cd-integration/</loc>
		<lastmod>2026-04-09T07:11:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/secret-rotation/</loc>
		<lastmod>2026-04-09T07:11:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/secure-storage-practices/</loc>
		<lastmod>2026-04-09T07:11:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/tools-hashicorp-vault-aws-secrets-manager/</loc>
		<lastmod>2026-04-09T07:10:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/what-are-secrets/</loc>
		<lastmod>2026-04-09T07:10:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/hands-on-lab-2/</loc>
		<lastmod>2026-04-09T07:10:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/secrets-exposure-risks/</loc>
		<lastmod>2026-04-09T07:10:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/configuration-scanning-tools/</loc>
		<lastmod>2026-04-09T07:09:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/terraform-security/</loc>
		<lastmod>2026-04-09T07:09:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/introduction-to-iac/</loc>
		<lastmod>2026-04-09T07:09:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/tools-aws-security-hub-azure-defender/</loc>
		<lastmod>2026-04-09T07:09:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/cloud-misconfigurations/</loc>
		<lastmod>2026-04-09T07:09:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/secure-cloud-deployment/</loc>
		<lastmod>2026-04-09T07:09:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/iam-security/</loc>
		<lastmod>2026-04-09T07:08:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/shared-responsibility-model/</loc>
		<lastmod>2026-04-09T07:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/kubernetes-hardening/</loc>
		<lastmod>2026-04-09T07:08:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/pod-security-standards/</loc>
		<lastmod>2026-04-09T07:08:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/network-policies/</loc>
		<lastmod>2026-04-09T07:08:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/rbac-access-control/</loc>
		<lastmod>2026-04-09T07:07:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/kubernetes-architecture/</loc>
		<lastmod>2026-04-09T07:07:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/runtime-security/</loc>
		<lastmod>2026-04-09T07:07:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/securing-dockerfiles/</loc>
		<lastmod>2026-04-09T07:07:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/image-scanning-tools-trivy-clair/</loc>
		<lastmod>2026-04-09T07:07:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/container-vulnerabilities/</loc>
		<lastmod>2026-04-09T07:06:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/docker-fundamentals/</loc>
		<lastmod>2026-04-09T07:06:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/hands-on-lab/</loc>
		<lastmod>2026-04-09T07:05:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/web-application-security-testing/</loc>
		<lastmod>2026-04-09T07:05:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/automated-code-scanning/</loc>
		<lastmod>2026-04-09T07:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/tools-sonarqube-checkmarx/</loc>
		<lastmod>2026-04-09T07:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/introduction-to-sast-dast/</loc>
		<lastmod>2026-04-09T07:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/integrating-security-tools-in-ci-cd/</loc>
		<lastmod>2026-04-09T07:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/pipeline-vulnerabilities/</loc>
		<lastmod>2026-04-09T07:04:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/github-actions-security/</loc>
		<lastmod>2026-04-09T07:04:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/securing-jenkins-pipelines/</loc>
		<lastmod>2026-04-09T07:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/ci-cd-fundamentals/</loc>
		<lastmod>2026-04-09T07:03:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/practical-threat-modeling-lab/</loc>
		<lastmod>2026-04-09T07:03:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/risk-assessment-techniques/</loc>
		<lastmod>2026-04-09T07:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/attack-surface-analysis/</loc>
		<lastmod>2026-04-09T07:03:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/stride-dread-models/</loc>
		<lastmod>2026-04-09T07:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/introduction-to-threat-modeling/</loc>
		<lastmod>2026-04-09T07:03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/common-vulnerabilities-owasp-top-10/</loc>
		<lastmod>2026-04-09T07:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/code-review-best-practices/</loc>
		<lastmod>2026-04-09T07:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/secure-design-principles/</loc>
		<lastmod>2026-04-09T07:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/security-requirements-gathering/</loc>
		<lastmod>2026-04-09T07:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/phases-of-ssdlc/</loc>
		<lastmod>2026-04-09T07:02:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/tools-overview-jenkins-docker-kubernetes-etc/</loc>
		<lastmod>2026-04-09T07:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/devsecops-lifecycle/</loc>
		<lastmod>2026-04-09T07:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/importance-of-security-in-ci-cd/</loc>
		<lastmod>2026-04-09T07:01:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/devops-vs-devsecops/</loc>
		<lastmod>2026-04-09T07:01:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/certified-devsecops-engineer-ecde/lessons/what-is-devsecops/</loc>
		<lastmod>2026-04-09T07:01:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/final-assessment-certification/</loc>
		<lastmod>2026-04-08T13:35:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/portfolio-project-submission/</loc>
		<lastmod>2026-04-08T13:35:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/industry-case-study-healthcare-finance/</loc>
		<lastmod>2026-04-08T13:35:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/end-to-end-ml-project-problem-%e2%86%92-deployment/</loc>
		<lastmod>2026-04-08T13:35:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/monitoring-ml-models/</loc>
		<lastmod>2026-04-08T13:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/deploying-on-cloud-aws-heroku/</loc>
		<lastmod>2026-04-08T13:34:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/building-apis-with-flask-fastapi/</loc>
		<lastmod>2026-04-08T13:34:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/saving-loading-models/</loc>
		<lastmod>2026-04-08T13:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/recommendation-systems/</loc>
		<lastmod>2026-04-08T13:34:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/time-series-forecasting/</loc>
		<lastmod>2026-04-08T13:33:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/computer-vision-fundamentals/</loc>
		<lastmod>2026-04-08T13:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/natural-language-processing-nlp-basics/</loc>
		<lastmod>2026-04-08T13:33:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/building-your-first-neural-network/</loc>
		<lastmod>2026-04-08T13:33:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/introduction-to-tensorflow-keras/</loc>
		<lastmod>2026-04-08T13:33:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/forward-backpropagation/</loc>
		<lastmod>2026-04-08T13:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/activation-functions/</loc>
		<lastmod>2026-04-08T13:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/neural-networks-basics/</loc>
		<lastmod>2026-04-08T13:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/bias-variance-tradeoff/</loc>
		<lastmod>2026-04-08T13:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/hyperparameter-tuning-grid-search-random-search/</loc>
		<lastmod>2026-04-08T13:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/cross-validation-techniques/</loc>
		<lastmod>2026-04-08T13:31:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/overfitting-vs-underfitting/</loc>
		<lastmod>2026-04-08T13:31:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/project-customer-segmentation/</loc>
		<lastmod>2026-04-08T13:31:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/anomaly-detection/</loc>
		<lastmod>2026-04-08T13:31:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/dimensionality-reduction-pca-2/</loc>
		<lastmod>2026-04-08T13:31:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/hierarchical-clustering/</loc>
		<lastmod>2026-04-08T13:31:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/k-means-clustering/</loc>
		<lastmod>2026-04-08T13:31:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/clustering-basics/</loc>
		<lastmod>2026-04-08T13:31:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/project-spam-email-classifier/</loc>
		<lastmod>2026-04-08T13:29:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/evaluation-metrics-accuracy-precision-recall-f1/</loc>
		<lastmod>2026-04-08T13:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/support-vector-machines-svm-2/</loc>
		<lastmod>2026-04-08T13:29:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/random-forest-2/</loc>
		<lastmod>2026-04-08T13:28:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/decision-trees-2/</loc>
		<lastmod>2026-04-08T13:28:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/k-nearest-neighbors-knn-2/</loc>
		<lastmod>2026-04-08T13:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/logistic-regression-2/</loc>
		<lastmod>2026-04-08T13:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/project-house-price-prediction/</loc>
		<lastmod>2026-04-08T13:28:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/model-evaluation-metrics-mse-rmse-r%c2%b2/</loc>
		<lastmod>2026-04-08T13:27:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/regularization-ridge-lasso/</loc>
		<lastmod>2026-04-08T13:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/polynomial-regression/</loc>
		<lastmod>2026-04-08T13:27:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/linear-regression-2/</loc>
		<lastmod>2026-04-08T13:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/introduction-to-regression/</loc>
		<lastmod>2026-04-08T13:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/feature-selection-techniques/</loc>
		<lastmod>2026-04-08T13:26:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/feature-scaling-normalization/</loc>
		<lastmod>2026-04-08T13:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/encoding-categorical-variables/</loc>
		<lastmod>2026-04-08T13:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/handling-missing-values-2/</loc>
		<lastmod>2026-04-08T13:26:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/data-cleaning-techniques-2/</loc>
		<lastmod>2026-04-08T13:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/gradient-descent-explained/</loc>
		<lastmod>2026-04-08T13:26:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/cost-functions-optimization/</loc>
		<lastmod>2026-04-08T13:26:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/statistics-for-ml/</loc>
		<lastmod>2026-04-08T13:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/probability-fundamentals/</loc>
		<lastmod>2026-04-08T13:26:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/linear-algebra-basics/</loc>
		<lastmod>2026-04-08T13:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/hands-on-mini-project-data-analysis/</loc>
		<lastmod>2026-04-08T13:25:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/data-visualization-matplotlib-seaborn/</loc>
		<lastmod>2026-04-08T13:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/pandas-for-data-manipulation/</loc>
		<lastmod>2026-04-08T13:25:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/numpy-for-numerical-computing/</loc>
		<lastmod>2026-04-08T13:25:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/python-basics-refresher/</loc>
		<lastmod>2026-04-08T13:25:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/setting-up-the-environment-python-jupyter-colab/</loc>
		<lastmod>2026-04-08T13:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/ml-workflow-overview/</loc>
		<lastmod>2026-04-08T13:24:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/real-world-applications-of-ml/</loc>
		<lastmod>2026-04-08T13:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/types-of-machine-learning-supervised-unsupervised-reinforcement/</loc>
		<lastmod>2026-04-08T13:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/machine-learning/lessons/what-is-machine-learning/</loc>
		<lastmod>2026-04-08T13:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/project-3-nft-minting-platform/</loc>
		<lastmod>2026-04-08T13:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/project-2-build-a-voting-dapp/</loc>
		<lastmod>2026-04-08T13:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/project-1-create-a-cryptocurrency-token/</loc>
		<lastmod>2026-04-08T13:21:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-11-4-future-of-web3/</loc>
		<lastmod>2026-04-08T13:21:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-11-3-interoperability/</loc>
		<lastmod>2026-04-08T13:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-11-2-sharding/</loc>
		<lastmod>2026-04-08T13:21:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-11-1-layer-2-solutions/</loc>
		<lastmod>2026-04-08T13:21:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-10-3-blockchain-attacks-51-sybil-etc/</loc>
		<lastmod>2026-04-08T13:20:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-10-2-security-best-practices/</loc>
		<lastmod>2026-04-08T13:20:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-10-1-common-smart-contract-vulnerabilities/</loc>
		<lastmod>2026-04-08T11:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-9-4-real-world-applications/</loc>
		<lastmod>2026-04-08T11:31:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-9-3-nfts-token-standards-erc-721-erc-1155/</loc>
		<lastmod>2026-04-08T11:31:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-9-2-lending-borrowing-protocols/</loc>
		<lastmod>2026-04-08T11:31:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-9-1-introduction-to-defi/</loc>
		<lastmod>2026-04-08T11:30:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-8-4-building-a-simple-dapp/</loc>
		<lastmod>2026-04-08T11:30:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-8-3-connecting-frontend-with-blockchain/</loc>
		<lastmod>2026-04-08T11:30:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-8-2-web3-js-ethers-js/</loc>
		<lastmod>2026-04-08T11:30:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-8-1-what-is-a-dapp/</loc>
		<lastmod>2026-04-08T11:30:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-7-5-smart-contract-deployment/</loc>
		<lastmod>2026-04-08T11:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-7-4-events-error-handling/</loc>
		<lastmod>2026-04-08T11:27:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-7-3-functions-modifiers/</loc>
		<lastmod>2026-04-08T11:27:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-7-2-variables-data-types/</loc>
		<lastmod>2026-04-08T11:27:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-7-1-solidity-basics/</loc>
		<lastmod>2026-04-08T11:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-6-4-writing-your-first-smart-contract/</loc>
		<lastmod>2026-04-08T11:26:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-6-3-gas-fees-transactions/</loc>
		<lastmod>2026-04-08T11:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-6-2-ethereum-virtual-machine-evm/</loc>
		<lastmod>2026-04-08T11:25:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-6-1-introduction-to-ethereum/</loc>
		<lastmod>2026-04-08T11:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-5-4-limitations-of-bitcoin/</loc>
		<lastmod>2026-04-08T11:24:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-5-3-transactions-wallets/</loc>
		<lastmod>2026-04-08T11:24:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-5-2-mining-process/</loc>
		<lastmod>2026-04-08T11:23:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-5-1-bitcoin-architecture/</loc>
		<lastmod>2026-04-08T11:23:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-4-4-consensus-trade-offs/</loc>
		<lastmod>2026-04-08T11:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-4-3-delegated-pos-other-models/</loc>
		<lastmod>2026-04-08T11:23:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-4-2-proof-of-stake-pos/</loc>
		<lastmod>2026-04-08T11:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-4-1-proof-of-work-pow/</loc>
		<lastmod>2026-04-08T11:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-3-4-types-of-blockchains-public-private-consortium/</loc>
		<lastmod>2026-04-08T11:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-3-3-distributed-ledger-technology-dlt/</loc>
		<lastmod>2026-04-08T11:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-3-2-nodes-and-networks/</loc>
		<lastmod>2026-04-08T11:22:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-3-1-blocks-and-transactions/</loc>
		<lastmod>2026-04-08T11:22:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-2-5-merkle-trees/</loc>
		<lastmod>2026-04-08T11:22:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-2-4-digital-signatures/</loc>
		<lastmod>2026-04-08T11:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-2-3-public-private-keys/</loc>
		<lastmod>2026-04-08T11:21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://training.drdsecurity.com/courses/blockchain-technology/lessons/lesson-2-2-hash-functions-sha-256/</loc>
		<lastmod>2026-04-08T11:21:45+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->