<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://staging.securityparagon.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/the-types-of-hardware-used-in-computer-networks/</loc><lastmod>2023-05-22T03:25:31+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/introduction-to-computer-networking/</loc><lastmod>2023-05-22T03:32:26+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/lesson-3-introduction-to-network-communication/</loc><lastmod>2023-05-22T04:22:18+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/cia-triad/</loc><lastmod>2023-05-27T02:33:04+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/what-is-malware/</loc><lastmod>2023-05-25T18:12:36+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/network-attacks-and-network-security-threats/</loc><lastmod>2023-05-25T03:45:36+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/cybersecurity-frameworks/</loc><lastmod>2023-05-29T04:41:23+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/what-is-vulnerability-management-what-is-cve-what-is-0-day-vulnerabilities/</loc><lastmod>2023-05-27T18:02:04+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/phishing-email/</loc><lastmod>2023-06-27T16:06:54+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/cyberkill-chain-static-and-dynamic-malware-analysis/</loc><lastmod>2023-06-10T03:51:29+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/lesson-8-incident-response-playbook-phishing-email-analysis-demo/</loc><lastmod>2023-06-25T01:36:53+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/sample-interview-questions/</loc><lastmod>2023-06-15T00:17:58+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/cryptography-and-authentication-basics/</loc><lastmod>2023-06-19T00:30:07+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/linux-basics/</loc><lastmod>2023-06-19T00:33:39+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/live-edr-solution-demo-crowdstrike/</loc><lastmod>2023-06-24T16:49:48+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/live-snort-ids-demo/</loc><lastmod>2023-07-03T16:46:04+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/splunk-demo/</loc><lastmod>2023-07-16T16:52:38+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/definition-and-scope-of-information-technology/</loc><lastmod>2024-02-03T06:29:23+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/evolution-of-it-and-its-impact-on-modern-society/</loc><lastmod>2024-02-03T06:29:43+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/understanding-computer-components-and-their-functions/</loc><lastmod>2024-02-03T06:34:25+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/overview-of-operating-systems-and-software-applications/</loc><lastmod>2024-02-03T06:34:40+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/introduction-to-computer-networks/</loc><lastmod>2024-02-03T06:35:03+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/basics-of-data-transmission-and-communication-protocols/</loc><lastmod>2024-02-03T06:35:20+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/cia-triad-2/</loc><lastmod>2024-02-03T06:35:49+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/common-cybersecurity-attacks-and-mitigation-techniques/</loc><lastmod>2024-02-03T06:36:14+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/basics-of-databases-and-data-storage/</loc><lastmod>2024-02-03T06:36:55+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/introduction-to-sql/</loc><lastmod>2024-02-03T06:37:16+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/overview-of-coding-and-programming-languages/</loc><lastmod>2024-02-03T06:37:51+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/basic-programming-concepts-and-logic/</loc><lastmod>2024-02-03T06:38:12+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/introduction-to-it/lesson/introduction-to-project-management-tools/</loc><lastmod>2024-02-03T06:38:37+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/sample-interview-question-soc-analyst/</loc><lastmod>2024-02-17T04:28:19+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/siem-rule-example/</loc><lastmod>2025-04-08T18:49:49+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/%f0%9f%9b%a1%ef%b8%8f-phishing-analysis-101-breaking-down-email-headers-like-a-pro/</loc><lastmod>2025-04-08T18:55:37+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/example/</loc><lastmod>2025-04-11T05:12:02+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/20-cve-exercises-with-siem-alert-analysis-questions-and-answers/</loc><lastmod>2025-06-14T06:26:16+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/soc-training-workbook/</loc><lastmod>2025-06-14T06:27:41+00:00</lastmod></url><url><loc>https://staging.securityparagon.com/courses/cybersecurity-analyst-training/lesson/10-cybersecurity-ir-frameworks-with-full-simulations/</loc><lastmod>2025-06-14T06:28:09+00:00</lastmod></url></urlset>
