<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ibexed.us/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ibexed.us/lessons/domain-6-authorization-approval-of-information-system/</loc>
		<lastmod>2025-04-18T17:09:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-5-assessment-audit-of-security-and-privacy-controls/</loc>
		<lastmod>2025-04-18T17:09:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-4-implementation-of-security-and-privacy-controls/</loc>
		<lastmod>2025-04-18T17:08:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-3-selection-and-approval-of-security-and-privacy-controls/</loc>
		<lastmod>2025-04-18T17:08:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-2-scope-of-the-information-system/</loc>
		<lastmod>2025-04-18T17:08:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-23/</loc>
		<lastmod>2025-04-18T17:08:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-1-information-security-risk-management-program-course-information/</loc>
		<lastmod>2025-04-18T17:08:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-9-explore-fundamentals-of-data-visualization/</loc>
		<lastmod>2025-04-18T13:21:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-8-explore-fundamentals-of-real-time-analytics/</loc>
		<lastmod>2025-04-18T13:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-7-explore-fundamentals-of-large-scale-data-warehousing/</loc>
		<lastmod>2025-04-18T13:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-explore-fundamentals-of-azure-cosmos-db/</loc>
		<lastmod>2025-04-18T13:21:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-explore-azure-storage-for-non-relational-data/</loc>
		<lastmod>2025-04-18T13:21:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-explore-relational-database-services-in-azure/</loc>
		<lastmod>2025-04-18T13:21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-explore-fundamental-relational-data-concepts/</loc>
		<lastmod>2025-04-18T13:20:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-explore-data-roles-and-services/</loc>
		<lastmod>2025-04-18T13:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-explore-core-data-concepts/</loc>
		<lastmod>2025-04-18T13:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-explore-fundamentals-of-natural-language-processing/</loc>
		<lastmod>2025-04-18T13:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-explore-fundamentals-of-computer-vision/</loc>
		<lastmod>2025-04-18T13:10:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-explore-fundamentals-of-machine-learning/</loc>
		<lastmod>2025-04-18T13:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-explore-fundamentals-of-artificial-intelligence/</loc>
		<lastmod>2025-04-18T13:10:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-manage-security-operations/</loc>
		<lastmod>2025-04-18T12:52:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-secure-compute-storage-and-databases/</loc>
		<lastmod>2025-04-18T12:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-21/</loc>
		<lastmod>2025-04-18T12:52:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-secure-networking/</loc>
		<lastmod>2025-04-18T12:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-20/</loc>
		<lastmod>2025-04-18T12:51:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-manage-identity-and-access/</loc>
		<lastmod>2025-04-18T12:51:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-19/</loc>
		<lastmod>2025-04-18T12:51:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/executing-jobs-and-processes/</loc>
		<lastmod>2025-04-04T02:04:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/automating-tasks-with-shell-scripts/</loc>
		<lastmod>2025-04-04T02:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/leveraging-bash-shell-features/</loc>
		<lastmod>2025-04-04T02:03:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/controlling-access-to-linux-resources/</loc>
		<lastmod>2025-04-04T02:03:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-17/</loc>
		<lastmod>2025-04-04T02:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/managing-files-and-directories/</loc>
		<lastmod>2025-04-04T02:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/accessing-the-system/</loc>
		<lastmod>2025-04-04T02:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/introducing-linux-course-information/</loc>
		<lastmod>2025-04-04T02:03:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-designing-and-implementing-a-tailored-governance-system/</loc>
		<lastmod>2025-04-04T01:50:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-performance-management-with-cobit-2019/</loc>
		<lastmod>2025-04-04T01:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-the-governance-system-and-components/</loc>
		<lastmod>2025-04-04T01:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-analyzing-the-three-governance-framework-principles/</loc>
		<lastmod>2025-04-04T01:49:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-analyzing-the-six-governance-principles/</loc>
		<lastmod>2025-04-04T01:49:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-key-concepts-and-terminology-of-cobit-2019/</loc>
		<lastmod>2025-04-04T01:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-18/</loc>
		<lastmod>2025-04-04T01:49:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-information-security-incident-management/</loc>
		<lastmod>2025-04-04T01:41:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-information-security-program-development-and-management/</loc>
		<lastmod>2025-04-04T01:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-information-risk-management-and-compliance/</loc>
		<lastmod>2025-04-04T01:41:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-information-security-governance/</loc>
		<lastmod>2025-04-04T01:41:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-4-risk-and-control-monitoring-and-reporting/</loc>
		<lastmod>2025-04-04T01:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-3-risk-response-and-mitigation/</loc>
		<lastmod>2025-04-04T01:33:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-16/</loc>
		<lastmod>2025-04-04T01:33:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-2-it-risk-assessment/</loc>
		<lastmod>2025-04-04T01:32:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-1-it-risk-identification-course-information/</loc>
		<lastmod>2025-04-04T01:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-4b-risk-management/</loc>
		<lastmod>2025-04-04T01:24:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-4a-risk-strategy/</loc>
		<lastmod>2025-04-04T01:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-3b-management-of-it-enabled-investments/</loc>
		<lastmod>2025-04-04T01:24:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-3a-it-performance-and-oversight/</loc>
		<lastmod>2025-04-04T01:24:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-2b-it-resource-optimization/</loc>
		<lastmod>2025-04-04T01:24:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-15/</loc>
		<lastmod>2025-04-04T01:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-2a-it-resource-planning/</loc>
		<lastmod>2025-04-04T01:24:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-1c-information-governance/</loc>
		<lastmod>2025-04-04T01:24:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-1b-technology-governance/</loc>
		<lastmod>2025-04-04T01:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-14/</loc>
		<lastmod>2025-04-04T01:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/domain-1a-governance-framework-course-information/</loc>
		<lastmod>2025-04-04T01:23:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-7-project-closure/</loc>
		<lastmod>2025-04-04T01:10:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-executing-the-plan/</loc>
		<lastmod>2025-04-04T01:10:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-baselining-the-plan/</loc>
		<lastmod>2025-04-04T01:10:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-project-risk-management/</loc>
		<lastmod>2025-04-04T01:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-planning-the-project/</loc>
		<lastmod>2025-04-04T01:10:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-13/</loc>
		<lastmod>2025-04-04T01:10:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-initiating-a-project/</loc>
		<lastmod>2025-04-04T01:09:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-introduction-to-project-management/</loc>
		<lastmod>2025-04-04T01:09:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-the-future-of-ai/</loc>
		<lastmod>2025-04-04T01:03:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-ai-society-and-ethics/</loc>
		<lastmod>2025-04-04T01:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-protecting-ai-systems/</loc>
		<lastmod>2025-04-04T01:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-exploring-generative-ai-and-chatgpt/</loc>
		<lastmod>2025-04-04T01:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-machines-that-learn/</loc>
		<lastmod>2025-04-04T01:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-12/</loc>
		<lastmod>2025-04-04T01:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-what-is-artificial-intelligence/</loc>
		<lastmod>2025-04-04T01:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-18-explaining-master-data-management-concepts/</loc>
		<lastmod>2025-04-04T00:56:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-17-applying-quality-control-to-data/</loc>
		<lastmod>2025-04-04T00:56:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-16-summarizing-the-importance-of-data-governance/</loc>
		<lastmod>2025-04-04T00:56:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-15-distinguishing-different-report-types/</loc>
		<lastmod>2025-04-04T00:56:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-14-designing-components-for-reports-and-dashboards/</loc>
		<lastmod>2025-04-04T00:55:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-13-expressing-business-requirements-in-a-report-format/</loc>
		<lastmod>2025-04-04T00:55:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-12-using-the-appropriate-type-of-visualization/</loc>
		<lastmod>2025-04-04T00:55:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-11-understanding-the-use-of-different-statistical-methods/</loc>
		<lastmod>2025-04-04T00:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-10-describing-key-analysis-techniques/</loc>
		<lastmod>2025-04-04T00:55:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-9-applying-descriptive-statistical-methods/</loc>
		<lastmod>2025-04-04T00:55:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-8-explaining-common-techniques-for-data-manipulation-and-optimization/</loc>
		<lastmod>2025-04-04T00:55:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-7-executing-different-data-manipulation-techniques/</loc>
		<lastmod>2025-04-04T00:55:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-identifying-common-reasons-for-cleansing-and-profiling-data/</loc>
		<lastmod>2025-04-04T00:55:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-explaining-data-integration-and-collection-methods/</loc>
		<lastmod>2025-04-04T00:54:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-comparing-and-contrasting-different-data-structures-formats-and-markup-languages/</loc>
		<lastmod>2025-04-04T00:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-understanding-types-and-characteristics-of-data/</loc>
		<lastmod>2025-04-04T00:54:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-understanding-different-data-systems/</loc>
		<lastmod>2025-04-04T00:54:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-identifying-basic-concepts-of-data-schemas/</loc>
		<lastmod>2025-04-04T00:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/5-0-compliance-and-assessment/</loc>
		<lastmod>2025-04-04T00:48:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-0-incident-response/</loc>
		<lastmod>2025-04-04T00:47:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/3-0-security-operations-and-monitoring/</loc>
		<lastmod>2025-04-04T00:47:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/2-0-software-and-systems-security/</loc>
		<lastmod>2025-04-04T00:47:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-threat-and-vulnerability-management/</loc>
		<lastmod>2025-04-04T00:46:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-15-installing-linux/</loc>
		<lastmod>2025-04-04T00:40:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-14-automating-tasks/</loc>
		<lastmod>2025-04-04T00:40:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-13-working-with-bash-scripts/</loc>
		<lastmod>2025-04-04T00:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-12-securing-linux-systems/</loc>
		<lastmod>2025-04-04T00:40:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-11/</loc>
		<lastmod>2025-04-04T00:40:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-11-managing-packages-and-software/</loc>
		<lastmod>2025-04-04T00:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-10-managing-networking/</loc>
		<lastmod>2025-04-04T00:39:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-10/</loc>
		<lastmod>2025-04-04T00:39:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-9-managing-devices/</loc>
		<lastmod>2025-04-04T00:39:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-8-managing-system-components/</loc>
		<lastmod>2025-04-04T00:39:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-7-managing-the-linux-boot-process/</loc>
		<lastmod>2025-04-04T00:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-6-managing-kernel-modules/</loc>
		<lastmod>2025-04-04T00:39:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-5-managing-files-and-directories/</loc>
		<lastmod>2025-04-04T00:39:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-4-managing-storage/</loc>
		<lastmod>2025-04-04T00:39:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-3-managing-permissions-and-ownership/</loc>
		<lastmod>2025-04-04T00:39:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-2-managing-users-and-groups/</loc>
		<lastmod>2025-04-04T00:38:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-9/</loc>
		<lastmod>2025-04-04T00:38:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-1-performing-basic-linux-tasks-course-information/</loc>
		<lastmod>2025-04-04T00:38:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-7-preparing-for-the-examination/</loc>
		<lastmod>2025-04-04T00:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-security-operations/</loc>
		<lastmod>2025-04-04T00:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-security-architecture/</loc>
		<lastmod>2025-04-04T00:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-threats-vulnerabilities-and-mitigations/</loc>
		<lastmod>2025-04-04T00:32:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-security-program-management-and-oversight/</loc>
		<lastmod>2025-04-04T00:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-general-security-concepts/</loc>
		<lastmod>2025-04-04T00:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-introduction-to-the-comptia-security-exam/</loc>
		<lastmod>2025-04-04T00:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/5-4-explain-cleanup-and-restoration-activities/</loc>
		<lastmod>2025-04-04T00:23:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/5-3-summarize-concepts-related-to-staging-and-exfiltration/</loc>
		<lastmod>2025-04-04T00:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/5-2-given-a-scenario-perform-tasks-to-move-laterally-throughout-the-environment/</loc>
		<lastmod>2025-04-04T00:23:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/5-1-given-a-scenario-perform-tasks-to-establish-and-maintain-persistence/</loc>
		<lastmod>2025-04-04T00:23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/5-0-post-exploitation-and-lateral-movement/</loc>
		<lastmod>2025-04-04T00:23:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-10-given-a-scenario-use-scripting-to-automate-attacks/</loc>
		<lastmod>2025-04-04T00:22:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-9-explain-common-attacks-against-specialized-systems/</loc>
		<lastmod>2025-04-04T00:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-8-given-a-scenario-perform-social-engineering-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:22:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-7-given-a-scenario-perform-wireless-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:22:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-6-given-a-scenario-perform-cloud-based-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:22:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-5-given-a-scenario-perform-web-application-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:22:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-4-given-a-scenario-perform-host-based-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:22:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-3-given-a-scenario-perform-authentication-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-2-given-a-scenario-perform-network-attacks-using-the-appropriate-tools/</loc>
		<lastmod>2025-04-04T00:21:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-1-given-a-scenario-analyze-output-to-prioritize-and-prepare-attacks/</loc>
		<lastmod>2025-04-04T00:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/4-0-attacks-and-exploits/</loc>
		<lastmod>2025-04-04T00:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/3-3-explain-physical-security-concepts/</loc>
		<lastmod>2025-04-04T00:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/3-2-given-a-scenario-analyze-output-from-reconnaissance-scanning-and-enumeration-phases/</loc>
		<lastmod>2025-04-04T00:21:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/3-1-given-a-scenario-conduct-vulnerability-discovery-using-various-techniques/</loc>
		<lastmod>2025-04-04T00:20:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-8/</loc>
		<lastmod>2025-04-04T00:20:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/2-4-given-a-scenario-use-the-appropriate-tools-for-reconnaissance-and-enumeration/</loc>
		<lastmod>2025-04-04T00:20:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/2-3-given-a-scenario-modify-scripts-for-reconnaissance-and-enumeration/</loc>
		<lastmod>2025-04-04T00:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/2-2-given-a-scenario-apply-enumeration-techniques/</loc>
		<lastmod>2025-04-04T00:20:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/2-1-given-a-scenario-apply-information-gathering-techniques/</loc>
		<lastmod>2025-04-04T00:20:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/2-0-reconnaissance-and-enumeration/</loc>
		<lastmod>2025-04-04T00:20:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/1-5-given-a-scenario-analyze-the-findings-and-recommend-the-appropriate-remediation-within-a-report/</loc>
		<lastmod>2025-04-04T00:20:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/1-4-explain-the-components-of-a-penetration-test-report/</loc>
		<lastmod>2025-04-04T00:19:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/1-3-compare-and-contrast-testing-frameworks-and-methodologies/</loc>
		<lastmod>2025-04-04T00:19:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/1-2-explain-collaboration-and-communication-activities/</loc>
		<lastmod>2025-04-04T00:19:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/1-1-summarize-pre-engagement-activities/</loc>
		<lastmod>2025-04-04T00:19:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/1-0-engagement-management/</loc>
		<lastmod>2025-04-04T00:19:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-29-develop-for-storage-on-cdns/</loc>
		<lastmod>2025-04-04T00:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-28-develop-for-azure-cache-for-redis/</loc>
		<lastmod>2025-04-04T00:13:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-7/</loc>
		<lastmod>2025-04-04T00:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-27-monitor-app-performance/</loc>
		<lastmod>2025-04-04T00:13:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-26-discover-azure-message-queues/</loc>
		<lastmod>2025-04-04T00:12:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-25-explore-azure-event-hubs/</loc>
		<lastmod>2025-04-04T00:12:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/lesson-6/</loc>
		<lastmod>2025-04-04T00:12:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-24-explore-azure-event-grid/</loc>
		<lastmod>2025-04-04T00:12:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-23-explore-api-management/</loc>
		<lastmod>2025-04-04T00:12:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-22-implement-azure-app-configuration/</loc>
		<lastmod>2025-04-04T00:12:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-21-implement-managed-identities/</loc>
		<lastmod>2025-04-04T00:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-20-implement-azure-key-vault/</loc>
		<lastmod>2025-04-04T00:12:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-19-explore-microsoft-graph/</loc>
		<lastmod>2025-04-04T00:12:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-18-implement-shared-access-signatures/</loc>
		<lastmod>2025-04-04T00:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-17-implement-authentication-by-using-the-microsoft-authentication-library/</loc>
		<lastmod>2025-04-04T00:11:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-16-explore-the-microsoft-identity-platform/</loc>
		<lastmod>2025-04-04T00:11:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-15-implement-azure-container-apps/</loc>
		<lastmod>2025-04-04T00:11:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-14-run-container-images-in-azure-container-instances/</loc>
		<lastmod>2025-04-04T00:11:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-13-manage-container-images-in-azure-container-registry/</loc>
		<lastmod>2025-04-04T00:11:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-12-work-with-azure-cosmos-db/</loc>
		<lastmod>2025-04-04T00:11:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-11-explore-azure-cosmos-db/</loc>
		<lastmod>2025-04-04T00:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-10-work-with-azure-blob-storage/</loc>
		<lastmod>2025-04-04T00:10:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-9-develop-event-based-solutions/</loc>
		<lastmod>2025-04-04T00:10:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-8-manage-the-azure-blob-storage-lifecycle/</loc>
		<lastmod>2025-04-04T00:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-7-explore-azure-blob-storage/</loc>
		<lastmod>2025-04-04T00:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-develop-azure-functions/</loc>
		<lastmod>2025-04-04T00:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-explore-azure-functions/</loc>
		<lastmod>2025-04-04T00:10:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-explore-azure-app-service-deployment-slots/</loc>
		<lastmod>2025-04-04T00:10:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-scale-apps-in-azure-app-service/</loc>
		<lastmod>2025-04-04T00:09:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-6-0-troubleshooting/</loc>
		<lastmod>2025-04-04T00:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-5-0-devops-fundamentals/</loc>
		<lastmod>2025-04-04T00:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-4-0-security/</loc>
		<lastmod>2025-04-04T00:02:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-3-0-operations/</loc>
		<lastmod>2025-04-04T00:01:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-0-deployment/</loc>
		<lastmod>2025-04-04T00:01:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-0-cloud-architecture/</loc>
		<lastmod>2025-04-04T00:01:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-2-configure-web-app-settings/</loc>
		<lastmod>2025-03-28T17:11:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-1-explore-azure-app-service/</loc>
		<lastmod>2025-03-28T17:11:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/chapter-6-no-code-machine-learning-classification-models/</loc>
		<lastmod>2025-03-28T16:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/chapter-5-no-code-machine-learning-regression-models/</loc>
		<lastmod>2025-03-28T16:22:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/chapter-4-no-code-machine-learning-clustering-models/</loc>
		<lastmod>2025-03-28T16:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/chapter-3-machine-learning-models-pre-built-pipelines-and-algorithms/</loc>
		<lastmod>2025-03-28T16:22:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/chapter-2-creating-datasets-for-training-models/</loc>
		<lastmod>2025-03-28T16:21:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/chapter-1-overview-of-no-code-machine-learning-course-information/</loc>
		<lastmod>2025-03-28T16:21:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ibexed.us/lessons/module-11-describe-monitoring-tools-in-azure/</loc>
		<lastmod>2025-03-28T16:09:54+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->