<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyentrix.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyentrix.com/academy/lesson/</loc>
		<lastmod>2026-02-20T04:25:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-identity-access-management/</loc>
		<lastmod>2026-02-20T04:25:14+00:00</lastmod>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/31991cf3-06dd-46df-81f1-f8e0ad4a7722.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-09_58_46-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_01_06-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/secure-disposal-of-hardware-and-media/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/usb-and-removable-media-controls/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/tracking-and-recovering-lost-devices/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/pre-employment-screening-and-vetting/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/insider-threat-indicators/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-exit-strategy-and-vendor-lock-in/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/security-clearance-and-need-to-know/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-cloud-security-roadmap/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/managing-leavers-access-revocation/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/contractor-and-temporary-worker-security/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/physical-security-risk-assessments/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/integrating-physical-and-cyber-security-operations/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/physical-penetration-testing/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/business-continuity-and-site-resilience/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-physical-security-roadmap/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/laptop-theft-and-loss-prevention/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/mobile-device-physical-security/</loc>
		<lastmod>2026-02-20T04:21:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/designing-a-secure-cloud-architecture/</loc>
		<lastmod>2026-02-20T04:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-native-security-tools-vs-third-party/</loc>
		<lastmod>2026-02-20T04:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-incident-response/</loc>
		<lastmod>2026-02-20T04:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/why-physical-security-is-part-of-cybersecurity/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/conditional-access-and-mfa-in-the-cloud/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-convergence-of-physical-and-digital-threats/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/privileged-access-in-cloud-environments/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/access-control-for-buildings-and-facilities/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/federation-and-single-sign-on-for-cloud/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/visitor-management-and-tailgating-prevention/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-classification-in-cloud-environments/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/physical-security-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/encryption-in-transit-and-at-rest/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/physical-security-layers-perimeter-building-room-and-rack/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-dlp-and-information-barriers/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cctv-and-surveillance-best-practices/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/meeting-compliance-requirements-in-the-cloud-gdpr-and-iso-27001/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/environmental-controls-fire-flood-and-power/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-audit-logging-and-evidence-collection/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/server-room-and-data-centre-access-controls/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/clean-desk-policy-and-document-security/</loc>
		<lastmod>2026-02-19T19:24:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-vendor-risk-assessment-questionnaire/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/software-bill-of-materials-sbom/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/key-cloud-security-risks-for-business/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/multi-cloud-security-challenges/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/evaluating-vendor-security-certifications-iso-27001-soc-2/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-security-readiness-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/technical-due-diligence-for-saas-vendors/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/iam-in-aws-azure-and-gcp-an-executive-overview/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/financial-and-operational-risk-indicators/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/vrm-programme-roadmap-and-maturity/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/managing-cloud-service-accounts-and-roles/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/scoring-and-tiering-your-vendor-portfolio/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-vendor-risk-and-why-it-matters/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-third-party-attack-surface/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-misconfiguration-the-leading-cause-of-breaches/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/vendor-risk-management-lifecycle/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/understanding-cloud-service-models-iaas-paas-and-saas/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-security-posture-management-cspm-tools/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/regulatory-requirements-for-vendor-oversight/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-shared-responsibility-model/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/infrastructure-as-code-security/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/vrm-readiness-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/supply-chain-attacks-explained-solarwinds-kaseya/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-vs-on-premises-security-differences/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/container-and-kubernetes-security-basics/</loc>
		<lastmod>2026-02-19T19:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/monitoring-for-compromised-credentials/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/secure-use-of-email-and-messaging/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/fourth-party-risk-your-vendors-vendors/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/why-security-awareness-matters-for-every-organisation/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/safe-web-browsing-and-downloads/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-supply-chain-resilience/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-human-factor-in-cyber-attacks/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/removable-media-and-physical-security/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-security-first-culture/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/working-securely-from-home/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/measuring-awareness-baseline/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/handling-sensitive-data-correctly/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/essential-security-clauses-in-vendor-contracts/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/awareness-programme-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-processing-agreements-dpas/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/right-to-audit-clauses/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/incident-notification-and-liability-terms/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/managing-contract-renewals-and-security-updates/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/continuous-monitoring-vs-point-in-time-assessments/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/security-rating-services-bitsight-securityscorecard/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/vendor-incident-response-and-escalation/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/enterprise-password-managers/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/managing-vendor-access-to-your-systems/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/passkeys-and-passwordless-authentication/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/handling-vendor-security-failures/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/credential-sharing-and-reuse-policies/</loc>
		<lastmod>2026-02-19T19:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/engaging-external-support-ncsc-law-enforcement-ir-retainers/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/testing-your-ir-plan-with-tabletop-exercises/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/detection-sources-and-alert-prioritisation/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/initial-triage-decision-framework/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/evidence-preservation-basics/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/log-analysis-for-executives/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/designing-an-annual-awareness-calendar/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/false-positive-management/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/anatomy-of-a-phishing-attack/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/training-delivery-methods-that-work/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/containment-strategies-short-term-vs-long-term/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/spear-phishing-and-business-email-compromise/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/gamification-and-engagement-strategies/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/eradication-removing-the-threat/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/social-engineering-tactics-beyond-email/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/measuring-programme-effectiveness/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/system-recovery-and-validation/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/running-phishing-simulations/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-an-awareness-roadmap-and-budget/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/business-continuity-during-an-incident/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/reporting-and-response-procedures/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/post-incident-review-and-lessons-learned/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/password-risks-your-staff-face-daily/</loc>
		<lastmod>2026-02-19T19:24:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/legal-and-regulatory-notification-requirements/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/customer-and-stakeholder-notification/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-crisis-communication-playbook/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-protection-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/encryption-explained-for-decision-makers/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/full-disk-vs-file-level-encryption/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/database-encryption-strategies/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/key-management-fundamentals/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/common-encryption-mistakes/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-dlp-and-when-you-need-it/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-incident-response-and-why-it-matters/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/dlp-policy-design/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-incident-response-lifecycle-nist/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/email-and-endpoint-dlp/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/roles-and-responsibilities-in-an-ir-team/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-dlp-for-saas-environments/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/when-to-declare-an-incident/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/measuring-dlp-effectiveness/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/ir-readiness-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/communicating-with-the-board-during-a-breach/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/anatomy-of-an-ir-plan/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/media-and-public-communications/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/escalation-procedures-and-communication-chains/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/regulatory-breach-reporting-ico-and-gdpr-timelines/</loc>
		<lastmod>2026-02-19T19:24:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/ids-vs-ips-explained-whats-the-difference/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-classification-frameworks/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/privacy-by-design-principles/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/signature-based-vs-anomaly-based-detection/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-lifecycle-management/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-subject-rights-and-requests/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/siem-integration-centralising-your-security-alerts/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/understanding-data-sovereignty/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/data-breach-notification-obligations/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/network-traffic-analysis-for-executives/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/privacy-impact-assessments/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-an-alerting-strategy-that-works/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/backup-strategy-the-3-2-1-rule-and-beyond/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/testing-your-recovery-capability/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/ransomware-proof-backup-architecture/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/cloud-backup-and-disaster-recovery/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-data-resilience-roadmap/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/dmz-architecture-protecting-public-facing-services/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/web-application-firewalls-why-your-website-needs-one/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/firewall-rule-management-and-auditing/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/gdpr-essentials-for-business-leaders/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/common-firewall-misconfigurations-and-how-to-avoid-them/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-data-protection-and-why-it-matters/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/uk-data-protection-act/</loc>
		<lastmod>2026-02-19T19:24:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/securing-corporate-wi-fi-standards-and-best-practices/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-network-security/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/byod-policy-and-risks-managing-personal-devices-at-work/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/network-segmentation-basics/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/zero-trust-network-access-ztna-beyond-the-vpn/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/firewalls-and-their-role-in-your-defences/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/secure-remote-desktop-and-vdi/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/vpns-and-secure-remote-access/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/monitoring-remote-access-knowing-whos-connected/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/network-security-self-assessment/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/designing-a-secure-network-architecture/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/next-generation-firewalls-vs-traditional-firewalls/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/micro-segmentation-shrinking-the-attack-surface/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/network-monitoring-and-visibility/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/threat-hunting-on-the-network-an-executive-primer/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-network-security-roadmap/</loc>
		<lastmod>2026-02-19T19:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/iam-self-assessment-where-does-your-organisation-stand/</loc>
		<lastmod>2026-02-19T18:46:24+00:00</lastmod>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_23_46-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_43_00-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/how-identity-breaches-happen-real-case-examples/</loc>
		<lastmod>2026-02-19T18:22:25+00:00</lastmod>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_18_31-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_18_36-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_22_03-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-principle-of-least-privilege/</loc>
		<lastmod>2026-02-19T18:16:20+00:00</lastmod>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_10_32-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_15_55-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_13_23-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/authentication-vs-authorisation-the-difference/</loc>
		<lastmod>2026-02-19T18:08:13+00:00</lastmod>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_03_18-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_07_12-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyentrix.com/wp-content/uploads/2026/02/ChatGPT-Image-Feb-19-2026-10_07_19-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-an-identity-security-operations-playbook/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-pam-roadmap-for-your-organisation/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/iam-architecture-patterns-on-premises-cloud-hybrid/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/single-sign-on-sso-and-federation/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/directory-services-and-identity-providers/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/iam-programme-governance-and-stakeholder-management/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/building-a-12-month-iam-roadmap/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-zero-trust-principles-and-misconceptions/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/identity-as-the-foundation-of-zero-trust/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/conditional-access-and-risk-based-authentication/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/microsegmentation-and-network-identity-controls/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/implementing-zero-trust-incrementally/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/the-identity-threat-landscape-attack-taxonomy/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/phishing-credential-theft-and-social-engineering/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/lateral-movement-and-privilege-escalation/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/identity-based-detection-and-response/</loc>
		<lastmod>2026-02-19T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/mfa-methods-compared-sms-totp-hardware-keys-passkeys/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/monitoring-and-alerting-on-privileged-activity/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/prioritising-where-to-enable-mfa-first/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->