<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cc2026.baremetalcyber.com/</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/baremetalcyber-home</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/academy-course-hub</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-25T20:51:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/welcome-to-the-isc2-cc-course</loc>
    <lastmod>2026-04-22T01:54:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-1-decode-the-2026-cc-blueprint-structure-and-spoken-learning-path</loc>
    <lastmod>2026-04-22T01:55:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-2-build-steady-pacing-and-decision-habits-for-adaptive-question-thinking</loc>
    <lastmod>2026-04-22T01:55:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-3-master-confidentiality-integrity-and-availability-as-your-security-compass</loc>
    <lastmod>2026-04-22T01:56:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-4-connect-authentication-authorization-accounting-non-repudiation-and-privacy-in-practice</loc>
    <lastmod>2026-04-22T01:57:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-5-protect-ai-integrity-privacy-and-availability-against-model-poisoning-risks</loc>
    <lastmod>2026-04-22T01:58:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-6-navigate-the-risk-management-lifecycle-and-risk-management-processes</loc>
    <lastmod>2026-04-22T01:58:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-7-map-regulations-laws-frameworks-guidelines-policies-standards-procedures-iso-and-cis</loc>
    <lastmod>2026-04-22T01:59:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-8-govern-ai-adoption-with-policies-laws-risk-appetite-transparency-and-bias-awareness</loc>
    <lastmod>2026-04-22T02:00:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-9-compare-technical-administrative-and-physical-controls-for-better-decisions</loc>
    <lastmod>2026-04-22T02:02:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-10-maintain-professional-conduct-with-due-care-diligence-and-isc2-ethics</loc>
    <lastmod>2026-04-22T02:06:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-11-apply-security-principles-through-fast-scenario-based-decision-making</loc>
    <lastmod>2026-04-22T02:06:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-12-plan-governance-risk-and-compliance-with-purpose-and-practical-tools</loc>
    <lastmod>2026-04-22T02:06:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-13-build-redundancy-thinking-around-business-continuity-and-disaster-recovery</loc>
    <lastmod>2026-04-22T02:07:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-14-protect-ai-continuity-through-dataset-backups-configuration-recovery-and-model-drift</loc>
    <lastmod>2026-04-22T02:07:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-15-shape-security-awareness-through-organizational-culture-and-leadership</loc>
    <lastmod>2026-04-22T02:09:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-16-defend-against-social-engineering-with-password-protection-and-phishing-awareness</loc>
    <lastmod>2026-04-22T02:09:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-17-measure-cybersecurity-effectiveness-using-kris-dashboards-scorecards-and-reports</loc>
    <lastmod>2026-04-22T02:10:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-18-connect-grc-redundancy-awareness-and-metrics-into-practical-governance-thinking</loc>
    <lastmod>2026-04-22T02:11:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-19-define-identity-roles-before-provisioning-decisions-create-access-risk</loc>
    <lastmod>2026-04-22T02:12:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-20-provision-access-with-lifecycle-control-and-accountability-in-mind</loc>
    <lastmod>2026-04-22T02:12:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-21-review-identity-access-regularly-before-privilege-drift-becomes-dangerous</loc>
    <lastmod>2026-04-22T02:14:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-22-deprovision-access-cleanly-when-roles-people-or-systems-change</loc>
    <lastmod>2026-04-22T02:15:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-23-compare-iam-frameworks-and-tools-without-losing-the-lifecycle-view</loc>
    <lastmod>2026-04-22T02:15:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-24-control-ai-bots-and-service-accounts-through-lifecycle-and-least-privilege</loc>
    <lastmod>2026-04-22T02:16:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-25-enforce-least-privilege-and-separation-of-duties-in-daily-decisions</loc>
    <lastmod>2026-04-22T02:16:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-26-evaluate-access-control-models-for-realistic-logical-control-choices</loc>
    <lastmod>2026-04-22T02:17:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-27-apply-iam-concepts-through-role-lifecycle-and-access-scenarios</loc>
    <lastmod>2026-04-22T02:17:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-28-map-osi-tcp-ip-ipv4-ipv6-and-vpn-concepts-clearly</loc>
    <lastmod>2026-04-22T02:18:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-29-interpret-firewalls-ports-and-applications-as-network-control-points</loc>
    <lastmod>2026-04-22T02:19:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-30-secure-wireless-concepts-across-wi-fi-bluetooth-and-everyday-connections</loc>
    <lastmod>2026-04-22T02:20:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-31-recognize-embedded-systems-ics-and-iot-security-boundaries</loc>
    <lastmod>2026-04-22T02:20:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-32-design-segmentation-with-firewall-zones-vlans-and-micro-segmentation</loc>
    <lastmod>2026-04-22T02:21:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-33-layer-defense-in-depth-and-zero-trust-into-architecture</loc>
    <lastmod>2026-04-22T02:21:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-34-secure-ai-data-pathways-with-segmentation-zero-trust-and-protected-environments</loc>
    <lastmod>2026-04-22T02:22:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-35-understand-cloud-characteristics-that-shape-security-expectations-and-risk</loc>
    <lastmod>2026-04-22T02:22:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-36-compare-cloud-service-models-saas-paas-iaas-and-responsibility-boundaries</loc>
    <lastmod>2026-04-22T02:23:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-37-choose-cloud-deployment-models-with-clear-security-tradeoff-thinking</loc>
    <lastmod>2026-04-22T02:23:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-38-apply-shared-security-models-across-roles-responsibilities-and-boundaries</loc>
    <lastmod>2026-04-22T02:24:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-39-protect-data-through-classification-labeling-masking-sanitization-and-handling</loc>
    <lastmod>2026-04-22T02:25:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-40-explain-symmetric-asymmetric-hashing-and-quantum-resistant-cryptography-clearly</loc>
    <lastmod>2026-04-22T02:25:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-41-monitor-logs-and-security-events-without-missing-important-signals</loc>
    <lastmod>2026-04-22T02:27:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-42-triage-security-events-with-use-cases-prioritization-and-correlation</loc>
    <lastmod>2026-04-22T02:27:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-43-triage-ai-assisted-siem-outputs-and-prevent-llm-workspace-data-leakage</loc>
    <lastmod>2026-04-22T02:28:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-44-profile-threat-actors-by-type-motivation-and-likely-behavior</loc>
    <lastmod>2026-04-22T02:28:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-45-turn-cyber-threat-intelligence-into-stronger-security-operations-decisions</loc>
    <lastmod>2026-04-22T02:29:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-46-organize-adversary-behavior-with-threat-frameworks-and-repeatable-thinking</loc>
    <lastmod>2026-04-22T02:30:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-47-implement-incident-response-plans-through-data-handling-policy-decisions</loc>
    <lastmod>2026-04-22T02:32:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-48-rehearse-incident-response-exercises-with-testing-and-tabletop-thinking</loc>
    <lastmod>2026-04-22T02:32:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-49-manage-asset-lifecycles-across-end-of-life-software-and-devices</loc>
    <lastmod>2026-04-22T02:33:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-50-control-configuration-and-change-management-without-creating-new-risk</loc>
    <lastmod>2026-04-22T02:33:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-51-validate-readiness-using-blue-teaming-purple-teaming-and-red-teaming</loc>
    <lastmod>2026-04-22T02:34:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-52-assess-applications-with-vulnerability-scanning-static-and-dynamic-analysis</loc>
    <lastmod>2026-04-22T02:34:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-53-model-application-threats-before-weaknesses-become-security-events</loc>
    <lastmod>2026-04-22T02:35:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-54-recognize-physical-penetration-testing-through-phishing-tailgating-and-impersonation</loc>
    <lastmod>2026-04-22T02:35:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-55-strengthen-operations-and-incident-response-through-full-lifecycle-scenarios</loc>
    <lastmod>2026-04-22T02:36:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-56-essential-terms-plain-language-glossary-for-core-cybersecurity-vocabulary</loc>
    <lastmod>2026-04-22T02:36:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-57-integrate-data-identity-network-cloud-and-governance-decisions-together</loc>
    <lastmod>2026-04-22T02:37:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-58-build-scenario-chains-across-security-principles-governance-iam-cloud-and-operations</loc>
    <lastmod>2026-04-22T02:38:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc2026.baremetalcyber.com/episodes/episode-59-connect-controls-metrics-threats-and-response-into-one-security-story</loc>
    <lastmod>2026-04-22T02:38:22Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
