<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://securityx.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/course-hub</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T03:13:55Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/welcome-to-certified-the-comptia-securityx-audio-course</loc>
    <lastmod>2026-03-29T19:26:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-1-master-the-securityx-exam-format-policies-scoring-and-pbq-time-tactics</loc>
    <lastmod>2026-03-29T19:26:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-2-build-a-spoken-study-plan-and-exam-day-mental-models-for-securityx-success</loc>
    <lastmod>2026-03-29T19:26:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-3-operationalize-security-program-documentation-policies-standards-procedures-guidelines</loc>
    <lastmod>2026-03-29T19:26:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-4-run-security-program-management-like-a-pro-training-raci-reporting</loc>
    <lastmod>2026-03-29T19:29:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-5-apply-governance-frameworks-wisely-cobit-itil-and-practical-control-mapping</loc>
    <lastmod>2026-03-29T19:30:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-6-control-change-and-configuration-management-without-creating-security-drift</loc>
    <lastmod>2026-03-29T19:30:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-7-use-grc-tools-for-mapping-automation-continuous-monitoring-and-evidence</loc>
    <lastmod>2026-03-29T19:30:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-8-govern-data-across-staging-environments-dev-test-qa-and-production</loc>
    <lastmod>2026-03-29T19:30:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-9-perform-impact-analysis-using-extreme-but-plausible-scenarios-that-actually-matter</loc>
    <lastmod>2026-03-29T19:30:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-10-execute-risk-assessments-quantitative-vs-qualitative-appetite-tolerance-prioritization</loc>
    <lastmod>2026-03-29T19:30:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-11-manage-third-party-risk-supply-chain-vendors-and-subprocessors-without-blind-spots</loc>
    <lastmod>2026-03-29T19:30:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-12-protect-availability-bc-dr-testing-connected-backups-disconnected-backups-recovery</loc>
    <lastmod>2026-03-29T19:31:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-13-protect-confidentiality-leak-response-privileged-data-breach-reporting-encryption</loc>
    <lastmod>2026-03-29T19:31:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-14-protect-integrity-hashing-remote-journaling-anti-tampering-interference-controls</loc>
    <lastmod>2026-03-29T19:31:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-15-build-privacy-into-risk-decisions-sovereignty-biometrics-and-data-subject-rights</loc>
    <lastmod>2026-03-29T19:31:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-16-explain-compliance-impacts-industry-requirements-and-cross-jurisdiction-realities</loc>
    <lastmod>2026-03-29T19:31:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-17-map-standards-and-frameworks-pci-dss-iso-iec-27000-soc-2-nist-csf-cis-csa</loc>
    <lastmod>2026-03-29T19:31:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-18-threat-modeling-like-you-mean-it-actors-motivations-resources-capabilities</loc>
    <lastmod>2026-03-29T19:31:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-19-threat-modeling-frameworks-in-practice-att-ck-capec-stride-kill-chain-owasp</loc>
    <lastmod>2026-03-29T19:32:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-20-determine-attack-surface-fast-trust-boundaries-data-flows-code-reviews-discovery</loc>
    <lastmod>2026-03-29T19:32:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-21-model-threat-applicability-control-selection-with-and-without-existing-systems</loc>
    <lastmod>2026-03-29T19:32:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-22-secure-ai-adoption-prompt-injection-data-poisoning-model-theft-and-model-dos</loc>
    <lastmod>2026-03-29T19:32:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-23-reduce-ai-risk-guardrails-dlp-permissions-disclosure-and-overreliance-traps</loc>
    <lastmod>2026-03-29T19:32:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-24-design-resilient-systems-component-placement-for-firewalls-ids-ips-waf-vpn-nac</loc>
    <lastmod>2026-03-29T19:38:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-25-engineer-availability-and-integrity-scaling-recoverability-persistence-geography</loc>
    <lastmod>2026-03-29T19:39:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-26-define-security-requirements-early-functional-non-functional-and-usability-tradeoffs</loc>
    <lastmod>2026-03-29T19:39:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-27-build-security-through-the-sdlc-coding-practices-reviews-testing-and-retesting</loc>
    <lastmod>2026-03-29T19:39:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-28-handle-supply-chain-risk-in-the-sdlc-software-hardware-assurance-and-eol</loc>
    <lastmod>2026-03-29T19:39:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-29-integrate-controls-into-secure-architecture-defense-in-depth-hardening-legacy-reality</loc>
    <lastmod>2026-03-29T19:39:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-30-enable-detection-by-design-central-logging-monitoring-alerting-and-sensor-placement</loc>
    <lastmod>2026-03-29T19:40:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-31-design-data-security-controls-classification-models-labeling-and-tagging-strategies</loc>
    <lastmod>2026-03-29T19:40:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-32-operationalize-dlp-architecture-at-rest-in-transit-and-data-discovery</loc>
    <lastmod>2026-03-29T19:40:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-33-secure-hybrid-architectures-and-third-party-integrations-without-weak-trust-boundaries</loc>
    <lastmod>2026-03-29T19:40:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-34-measure-control-effectiveness-assessments-scanning-and-metrics-that-drive-action</loc>
    <lastmod>2026-03-29T19:40:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-35-design-secure-access-systems-provisioning-deprovisioning-federation-and-sso</loc>
    <lastmod>2026-03-29T19:41:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-36-apply-access-control-models-precisely-rbac-abac-mac-dac-and-enforcement-points</loc>
    <lastmod>2026-03-29T19:41:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-37-build-pki-architecture-that-works-ca-ra-templates-ocsp-stapling-certificate-types</loc>
    <lastmod>2026-03-29T19:41:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-38-secure-physical-and-logical-access-control-systems-with-auditable-decisions</loc>
    <lastmod>2026-03-29T19:41:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-39-securely-implement-cloud-capabilities-casb-ci-cd-containers-serverless-api-security</loc>
    <lastmod>2026-03-29T19:41:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-40-integrate-zero-trust-into-architecture-subjects-objects-zones-perimeters-reauth</loc>
    <lastmod>2026-03-29T19:41:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-41-deperimeterize-safely-sase-sd-wan-software-defined-networking-and-segmentation</loc>
    <lastmod>2026-03-29T19:41:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-42-troubleshoot-enterprise-iam-failures-conditional-access-federation-saml-oauth-mfa</loc>
    <lastmod>2026-03-29T19:42:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-43-harden-secrets-management-tokens-certificates-passwords-keys-rotation-deletion</loc>
    <lastmod>2026-03-29T19:42:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-45-reduce-endpoint-attack-surface-application-control-configuration-management-isolation</loc>
    <lastmod>2026-03-29T19:44:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-46-troubleshoot-network-infrastructure-issues-dnssec-dkim-spf-dmarc-tls-cipher-mismatch</loc>
    <lastmod>2026-03-29T19:45:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-47-fix-ips-ids-and-observability-gaps-rule-quality-placement-false-positives-coverage</loc>
    <lastmod>2026-03-29T19:45:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-48-implement-hardware-security-tpm-hsm-vtpm-secure-boot-measured-boot-enclaves</loc>
    <lastmod>2026-03-29T19:45:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-49-defend-against-firmware-and-physical-ttps-shimming-usb-attacks-bios-uefi-memory</loc>
    <lastmod>2026-03-29T19:45:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-50-secure-ot-and-iot-systems-scada-ics-embedded-rf-segmentation-monitoring</loc>
    <lastmod>2026-03-29T19:45:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-51-secure-specialized-and-legacy-systems-constraints-obsolescence-unsupported-reality</loc>
    <lastmod>2026-03-29T19:45:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-52-use-automation-to-secure-the-enterprise-iac-triggers-patching-soar-scap</loc>
    <lastmod>2026-03-29T19:45:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-53-explain-advanced-cryptography-pqc-forward-secrecy-aead-homomorphic-encryption</loc>
    <lastmod>2026-03-29T19:46:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-54-apply-cryptography-correctly-use-cases-key-management-models-and-practical-techniques</loc>
    <lastmod>2026-03-29T19:46:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-55-analyze-monitoring-data-like-a-defender-siem-parsing-retention-baselines-correlation</loc>
    <lastmod>2026-03-29T19:46:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-56-make-alerts-actionable-prioritization-factors-failures-and-false-positive-control</loc>
    <lastmod>2026-03-29T19:46:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-57-incorporate-diverse-data-sources-threat-feeds-scans-bounties-cspm-logs-dlp</loc>
    <lastmod>2026-03-29T19:46:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-58-analyze-vulnerabilities-and-attacks-injection-xss-ssrf-misconfigurations-secrets</loc>
    <lastmod>2026-03-29T19:46:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-59-recommend-attack-surface-reductions-validation-patching-encryption-defense-in-depth</loc>
    <lastmod>2026-03-29T19:46:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-60-apply-threat-hunting-and-intelligence-internal-sources-osint-dark-web-isacs</loc>
    <lastmod>2026-03-29T19:47:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-61-turn-intelligence-into-action-tips-ioc-sharing-stix-taxii-sigma-yara-snort</loc>
    <lastmod>2026-03-29T19:47:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-62-analyze-incident-artifacts-sandboxing-ioc-extraction-stylometry-reverse-engineering</loc>
    <lastmod>2026-03-29T19:47:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://securityx.baremetalcyber.com/episodes/episode-63-perform-root-cause-and-recovery-analysis-metadata-volatile-data-host-and-network</loc>
    <lastmod>2026-03-29T19:47:35Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
