<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cisspmadeeasy.com/2024/09/29/modern-warfare-and-mass-surveillance-unveiling-the-invisible-hand/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/09/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-29T23:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/09/19/the-hidden-threat-are-your-devices-truly-safe/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-03-25T10:16:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/09/19/is-phone-spying-preventable/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-19T00:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/08/29/the-cycle-of-learning-the-power-of-intention/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/untitled-diagram.jpg</image:loc><image:title>Untitled Diagram</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-01T03:11:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/08/01/the-ripple-effect-of-the-crowdstrike-incident-an-expanded-attack-surface-and-potential-future-threats/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/88f52cc6-ab6c-4f8f-98e3-5e9380e3cb16.jpg</image:loc><image:title>88f52cc6-ab6c-4f8f-98e3-5e9380e3cb16</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-31T10:03:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/02/23/what-is-zero-trust-principle-and-architectural-components-cissp-ccsp/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/02/13750a82-7d69-46a6-9d5c-d8c1db37d8bf.jpeg</image:loc><image:title>_13750a82-7d69-46a6-9d5c-d8c1db37d8bf</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/02/605314ef-a25b-4e16-ba19-f1227b8819ad.jpeg</image:loc><image:title>_605314ef-a25b-4e16-ba19-f1227b8819ad</image:title></image:image><lastmod>2024-08-14T02:06:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/08/12/domain3-understanding-security-architecture-and-engineering-in-cissp/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-12T02:02:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/07/24/understanding-the-crowdstrike-incident-of-july-2024/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/07/img_3906.jpg</image:loc><image:title>IMG_3906</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/07/falcon-review.jpg</image:loc><image:title>falcon-review</image:title></image:image><lastmod>2024-08-02T04:01:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/08/01/a-future-ransomware-attack-exploiting-the-crowdstrike-incident-vulnerabilities/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/08/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-01T11:47:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/15/understanding-the-bell-lapadula-model-for-secure-computing-systems/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/06/vulk.jpg</image:loc><image:title>vulk</image:title></image:image><lastmod>2024-07-25T00:50:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/13/understanding-cryptography-a-comprehensive-overview/</loc><lastmod>2024-06-13T12:26:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/13/understanding-aaa-authentication-authorization-and-accounting/</loc><lastmod>2024-06-13T12:16:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/13/understanding-the-fundamentals-of-information-security-a-comprehensive-recap/</loc><lastmod>2024-06-13T12:09:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/13/understanding-cia-and-its-universe-a-deep-dive-into-information-security/</loc><lastmod>2024-06-13T12:06:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/13/understanding-security-governance-through-principles-and-policies/</loc><lastmod>2024-06-13T11:50:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/13/the-relevance-of-mathematics-to-the-real-world-a-deep-dive-into-theory-and-practice/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/06/12554-max.jpeg</image:loc><image:title>12554-max</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/06/photo-2024-06-13-21-35-15.jpg</image:loc><image:title>PHOTO-2024-06-13-21-35-15</image:title></image:image><lastmod>2024-07-24T02:50:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/07/otp-tools-and-the-risk-of-dll-sideloading/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/06/photo-2024-06-07-21-43-15.jpg</image:loc><image:title>PHOTO-2024-06-07-21-43-15</image:title></image:image><lastmod>2024-06-07T11:56:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/01/how-i-passed-cissp-a-minimalistic-approach-to-success/</loc><lastmod>2024-06-04T12:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/02/ai-chatgpt-and-az900/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/06/img_3906.jpg</image:loc><image:title>IMG_3906</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/06/img_0949.jpg</image:loc><image:title>IMG_0949</image:title></image:image><lastmod>2024-06-02T11:29:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/06/01/mastering-security-governance-principles-and-policies-for-success/</loc><lastmod>2024-06-01T09:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/05/24/mastering-cissp-the-art-of-symmetric-key-cryptography-with-karan-arjun/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/05/oip.jpg</image:loc><image:title>OIP</image:title></image:image><lastmod>2024-05-24T08:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/05/22/understanding-the-foundational-principles-of-cybersecurity-a-beginners-guide/</loc><lastmod>2024-05-22T06:37:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/05/16/symmetric-key-cryptography-and-diffie-hellman-key-exchange/</loc><lastmod>2024-05-16T08:47:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2023/04/05/cissp-series-domain3-episode-15-mathematical-relevance-in-security-models-and-real-life/</loc><lastmod>2024-05-15T00:35:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/05/10/navigating-the-depths-of-cryptography-a-cissp-recap/</loc><lastmod>2024-05-10T11:39:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/02/28/encryption-algorithm-types-and-modes/</loc><lastmod>2024-05-08T00:31:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/05/07/cissp-series-domain3-episode-24-cryptography-1000ft-overview-cissp/</loc><lastmod>2024-05-07T11:13:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/01/18/risk-appetite-vs-risk-tolerance/</loc><lastmod>2024-01-18T09:45:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2024/01/18/spectre-and-meltdown/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/01/e69fb2f9-e722-4487-94d0-9065ca3bb2a7.jpeg</image:loc><image:title>_e69fb2f9-e722-4487-94d0-9065ca3bb2a7</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/01/ad57b218-1c3e-49b7-a886-c4254c3eb7bb.jpeg</image:loc><image:title>_ad57b218-1c3e-49b7-a886-c4254c3eb7bb</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/01/1358466b-0533-4cb0-846b-d0c4c5b4d3e0.jpeg</image:loc><image:title>_1358466b-0533-4cb0-846b-d0c4c5b4d3e0</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/01/1497b508-9216-4ae8-b4c5-274347ea7e7d.jpeg</image:loc><image:title>_1497b508-9216-4ae8-b4c5-274347ea7e7d</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/01/385f26bb-877c-4e2e-a3ea-c572abaf7fdd.jpeg</image:loc><image:title>_385f26bb-877c-4e2e-a3ea-c572abaf7fdd</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2024/01/4c84cb6d-bdc9-4369-bb08-96d22dcb0208.jpeg</image:loc><image:title>_4c84cb6d-bdc9-4369-bb08-96d22dcb0208</image:title></image:image><lastmod>2024-01-18T03:44:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2023/11/15/optus-outage-incident-root-cause-analysis/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2023/11/optus-outage.png</image:loc><image:title>optus-outage</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2023/11/25968128c59353080eb14380252f63d9bf3666b4.webp</image:loc><image:title>25968128c59353080eb14380252f63d9bf3666b4</image:title></image:image><lastmod>2024-01-18T03:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/03/05/cve-2021-4428-log4shell-log4j/</loc><lastmod>2023-01-25T07:18:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/07/28/cissp-series/</loc><lastmod>2022-12-22T04:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/08/06/it-is-worth-revisiting-the-famous-seven-acts-of-courage/</loc><lastmod>2022-08-06T02:19:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/05/24/how-to-pass-cissp-exam/</loc><lastmod>2022-05-23T15:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/03/18/memorise-eal-in-9-minutes/</loc><lastmod>2022-03-18T11:23:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/03/09/fault-tolerance-vs-system-resiliency/</loc><lastmod>2022-03-08T13:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/02/16/ccsp-final-notes-before-passing-the-exam/</loc><lastmod>2024-08-12T02:13:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/28/cissp-notes-malicious-codes-and-application-attacks/</loc><lastmod>2022-01-12T07:02:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/01/12/ccsp-osg-book-fact-sheets/</loc><lastmod>2022-01-12T06:56:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2022/01/04/ccsp-hand-notes-chapter-1-architectural-concepts/</loc><lastmod>2022-01-04T12:01:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/23/cryptographic-modes-of-operations/</loc><lastmod>2021-12-23T09:32:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/20/cissp-infographics-ais-stix/</loc><lastmod>2021-12-20T06:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/20/ad-vs-ldap/</loc><lastmod>2021-12-20T06:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/cissp-infographics-cryptography-part-2/</loc><lastmod>2021-12-19T09:59:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/cissp-infographics-cryptography-part-1/</loc><lastmod>2021-12-19T09:57:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/cissp-infographics-domain2-asset-security/</loc><lastmod>2021-12-19T09:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/cissp-infographics-drp-key-terms/</loc><lastmod>2021-12-19T09:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/cissp-infographics-rmf-risk-management-concepts/</loc><lastmod>2021-12-19T06:12:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/common-criteria-and-eal-levels/</loc><lastmod>2021-12-19T06:06:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/swcmm/</loc><lastmod>2021-12-19T06:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/cissp-infographics-social-engineering/</loc><lastmod>2021-12-19T06:05:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/154/</loc><lastmod>2021-12-19T03:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/19/investigation-and-ethics-part-2/</loc><lastmod>2021-12-19T02:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/17/cissp-infographics-bcp/</loc><lastmod>2021-12-18T01:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/18/cissp-infographics-security-governance/</loc><lastmod>2022-03-14T03:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/17/cissp-infographics-personnel-security/</loc><lastmod>2021-12-17T08:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2021/12/17/cissp-infographics-cyber-laws/</loc><lastmod>2021-12-17T07:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/about/</loc><lastmod>2021-12-17T06:58:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cisspmadeeasy.com/2021/12/17/cissp-infographics-privacy/</loc><lastmod>2021-12-17T06:49:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/11/10/isc2-code-of-ethics-canons/</loc><lastmod>2019-11-09T20:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/11/10/tcsec-protection-mind-map/</loc><lastmod>2019-11-09T20:15:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/11/10/evaluation-assurance-level/</loc><lastmod>2019-11-09T20:13:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/03/15/optimising-traffic-capacity-in-an-age-of-terabit-ddos-attacks/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2019/03/ddos.jpg</image:loc><image:title>ddos</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2019/03/screen-shot-2019-03-15-at-11.14.01-am.jpg</image:loc><image:title>Screen Shot 2019-03-15 at 11.14.01 am</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2019/03/screen-shot-2019-03-15-at-10.42.41-am.jpg</image:loc><image:title>Screen Shot 2019-03-15 at 10.42.41 am</image:title></image:image><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2019/03/screen-shot-2019-03-15-at-10.39.54-am.jpg</image:loc><image:title>Screen Shot 2019-03-15 at 10.39.54 am</image:title></image:image><lastmod>2019-11-21T20:35:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/03/14/arbor-helpful-hacks/</loc><lastmod>2022-12-11T03:46:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/03/11/bgp-flowspec-configuration-for-juniper-mx/</loc><lastmod>2019-03-11T22:58:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/02/04/example-network-attacks/</loc><lastmod>2019-03-11T05:38:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2012/05/29/ipsec-vpn-configuration/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2012/05/vpn.jpg</image:loc><image:title>vpn</image:title></image:image><lastmod>2019-03-11T05:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/2019/03/11/bgp-flowspec-configuration-for-asrs/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2019/03/for-bp.jpg</image:loc><image:title>For BP</image:title></image:image><lastmod>2019-03-11T02:18:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cisspmadeeasy.com/contact/</loc><image:image><image:loc>https://cisspmadeeasy.com/wp-content/uploads/2019/03/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2019-03-08T00:16:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cisspmadeeasy.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-03-25T10:16:50+00:00</lastmod></url></urlset>
