<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyentrix.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyentrix.com/academy/lesson/why-passwords-alone-are-not-enough/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/vaulting-credentials-tools-and-options-cyberark-azure-pim-open-source/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/mfa-methods-compared-sms-totp-hardware-keys-passkeys/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/monitoring-and-alerting-on-privileged-activity/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/prioritising-where-to-enable-mfa-first/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/implementing-mfa-on-microsoft-365-google-workspace/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/why-access-creep-happens-and-how-to-stop-it/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/handling-mfa-exceptions-and-recovery-codes-securely/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/designing-a-quarterly-access-review-process/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/testing-your-mfa-rollout/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/joiner-mover-leaver-jml-lifecycle-management/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/role-based-access-control-rbac-explained/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/identity-governance-tools-overview-sailpoint-entra-id-governance-etc/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/mapping-roles-to-job-functions-in-your-organisation/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/metrics-and-reporting-for-iam-maturity/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/conducting-an-access-rights-review/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/removing-unnecessary-permissions-a-step-by-step-process/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/access-control-for-shared-and-generic-accounts/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/automating-provisioning-and-de-provisioning/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyentrix.com/academy/lesson/what-is-a-privileged-account-and-why-attackers-target-them/</loc>
		<lastmod>2026-02-19T08:43:59+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->