<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cc.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T02:43:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-1-decode-the-isc2-cc-cat-exam-structure-scoring-policies-tactics</loc>
    <lastmod>2026-03-11T05:08:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-2-build-a-spoken-study-plan-that-matches-the-official-cc-objectives</loc>
    <lastmod>2026-03-11T05:08:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-3-exam-day-execution-without-panic-time-guessing-and-cat-decision-rules</loc>
    <lastmod>2026-03-11T05:08:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-4-master-confidentiality-prevent-data-exposure-through-practical-security-thinking</loc>
    <lastmod>2026-03-11T05:08:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-6-safeguard-availability-keep-systems-reliable-through-disruptions-and-failures</loc>
    <lastmod>2026-03-11T05:09:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-7-choose-authentication-methods-wisely-factors-strengths-and-common-mistakes</loc>
    <lastmod>2026-03-11T05:09:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-8-make-mfa-make-sense-when-to-require-it-and-how-it-fails</loc>
    <lastmod>2026-03-11T05:09:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-9-non-repudiation-explained-clearly-proof-accountability-and-digital-assurance</loc>
    <lastmod>2026-03-11T05:10:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-10-understand-privacy-as-a-security-concept-data-use-consent-and-minimization</loc>
    <lastmod>2026-03-11T05:10:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-11-set-risk-priorities-that-match-the-business-mission-and-real-constraints</loc>
    <lastmod>2026-03-11T05:10:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-12-define-risk-tolerance-clearly-what-the-organization-will-live-with</loc>
    <lastmod>2026-03-11T05:10:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-13-identify-risk-inputs-assets-threats-vulnerabilities-and-exposure-pathways</loc>
    <lastmod>2026-03-11T05:10:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-14-assess-risk-properly-likelihood-impact-and-meaningful-risk-statements</loc>
    <lastmod>2026-03-11T05:10:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-15-treat-risk-confidently-avoid-mitigate-transfer-or-accept-with-rationale</loc>
    <lastmod>2026-03-11T05:10:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-16-apply-technical-controls-that-reduce-risk-without-breaking-operations</loc>
    <lastmod>2026-03-11T05:10:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-17-use-administrative-controls-well-policies-process-discipline-and-human-factors</loc>
    <lastmod>2026-03-11T05:10:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-18-strengthen-physical-controls-layers-barriers-and-practical-deterrence-strategies</loc>
    <lastmod>2026-03-11T05:10:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-19-operationalize-the-isc2-code-of-ethics-under-real-workplace-pressure</loc>
    <lastmod>2026-03-11T05:11:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-20-turn-governance-into-action-policies-procedures-and-standards-that-stick</loc>
    <lastmod>2026-03-11T05:11:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-21-navigate-regulations-and-laws-what-compliance-demands-from-security-work</loc>
    <lastmod>2026-03-11T05:11:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-22-business-continuity-purpose-keep-critical-work-going-during-disruption</loc>
    <lastmod>2026-03-11T05:11:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-23-business-continuity-importance-downtime-costs-priorities-and-stakeholder-trust</loc>
    <lastmod>2026-03-11T05:11:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-24-business-continuity-components-roles-dependencies-plans-and-testing-cadence</loc>
    <lastmod>2026-03-11T05:11:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-25-disaster-recovery-purpose-restore-it-services-fast-and-validate-the-return</loc>
    <lastmod>2026-03-11T05:13:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-26-disaster-recovery-importance-rto-rpo-and-tradeoffs-you-must-understand</loc>
    <lastmod>2026-03-11T05:13:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-27-disaster-recovery-components-backups-failover-runbooks-and-recovery-checks</loc>
    <lastmod>2026-03-11T05:13:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-28-incident-response-purpose-contain-damage-and-restore-normal-operations</loc>
    <lastmod>2026-03-11T05:13:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-29-incident-response-importance-speed-evidence-and-communication-under-stress</loc>
    <lastmod>2026-03-11T05:13:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-30-incident-response-components-prepare-detect-contain-eradicate-recover</loc>
    <lastmod>2026-03-11T05:13:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-31-physical-access-controls-badges-gate-entry-and-environmental-design-basics</loc>
    <lastmod>2026-03-11T05:13:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-32-monitoring-physical-security-guards-cctv-alarms-and-logs-that-matter</loc>
    <lastmod>2026-03-11T05:13:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-33-authorized-versus-unauthorized-personnel-verification-escorts-and-real-control</loc>
    <lastmod>2026-03-11T05:14:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-34-least-privilege-in-practice-reducing-risk-without-slowing-work-to-a-crawl</loc>
    <lastmod>2026-03-11T05:14:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-35-segregation-of-duties-made-simple-preventing-abuse-and-catching-mistakes-early</loc>
    <lastmod>2026-03-11T05:14:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-36-discretionary-access-control-ownership-permissions-and-where-it-breaks-down</loc>
    <lastmod>2026-03-11T05:14:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-37-mandatory-access-control-labels-rules-and-high-control-environments</loc>
    <lastmod>2026-03-11T05:14:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-38-role-based-access-control-designing-roles-that-actually-reflect-job-duties</loc>
    <lastmod>2026-03-11T05:14:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-39-computer-networking-foundations-osi-and-tcp-ip-models-for-security-thinking</loc>
    <lastmod>2026-03-11T05:14:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-40-ipv4-and-ipv6-basics-addressing-notation-and-security-relevant-differences</loc>
    <lastmod>2026-03-11T05:14:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-41-wifi-fundamentals-for-security-how-wireless-works-and-where-attacks-hide</loc>
    <lastmod>2026-03-11T05:14:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-42-ports-and-applications-mapping-network-conversations-to-real-risk</loc>
    <lastmod>2026-03-11T05:15:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-43-network-threat-types-ddos-viruses-worms-trojans-mitm-side-channels</loc>
    <lastmod>2026-03-11T05:15:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-44-identify-attacks-using-ids-concepts-what-detection-can-and-cannot-prove</loc>
    <lastmod>2026-03-11T05:15:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-45-hids-and-nids-explained-host-versus-network-detection-tradeoffs</loc>
    <lastmod>2026-03-11T05:15:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-46-prevent-attacks-with-antivirus-and-scanning-strengths-limits-and-good-use</loc>
    <lastmod>2026-03-11T05:15:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-47-firewalls-and-ips-fundamentals-blocking-allowing-and-stopping-what-matters</loc>
    <lastmod>2026-03-11T05:15:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-48-on-prem-network-infrastructure-power-hvac-fire-suppression-redundancy</loc>
    <lastmod>2026-03-11T05:15:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-49-mous-and-moas-in-infrastructure-planning-shared-responsibilities-and-risk</loc>
    <lastmod>2026-03-11T05:16:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-50-network-design-security-dmz-vlan-vpn-and-micro-segmentation-done-right</loc>
    <lastmod>2026-03-11T05:16:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-51-defense-in-depth-and-nac-segmentation-for-embedded-systems-and-iot</loc>
    <lastmod>2026-03-11T05:16:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-52-cloud-network-concepts-sla-msp-saas-paas-iaas-hybrid-explained</loc>
    <lastmod>2026-03-11T05:16:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-53-encryption-essentials-symmetric-asymmetric-and-hashing-without-confusion</loc>
    <lastmod>2026-03-11T05:16:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-54-data-handling-discipline-classification-labeling-retention-and-destruction</loc>
    <lastmod>2026-03-11T05:16:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-55-logging-and-monitoring-security-events-what-to-capture-for-real-value</loc>
    <lastmod>2026-03-11T05:16:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-56-system-hardening-through-configuration-management-baselines-updates-patches</loc>
    <lastmod>2026-03-11T05:16:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-57-data-handling-policy-essentials-rules-that-prevent-the-most-common-mistakes</loc>
    <lastmod>2026-03-11T05:16:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-58-password-policy-essentials-strength-rotation-myths-and-practical-enforcement</loc>
    <lastmod>2026-03-11T05:16:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-59-acceptable-use-policy-setting-boundaries-without-creating-shadow-it</loc>
    <lastmod>2026-03-11T05:17:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-60-byod-policy-basics-balancing-user-convenience-and-organizational-security</loc>
    <lastmod>2026-03-11T05:17:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-61-change-management-policy-documentation-approval-and-rollback-that-works</loc>
    <lastmod>2026-03-11T05:17:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-62-privacy-policy-essentials-expectations-handling-rules-and-accountability</loc>
    <lastmod>2026-03-11T05:17:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-63-security-awareness-training-concepts-social-engineering-and-human-exploits</loc>
    <lastmod>2026-03-11T05:17:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/episode-64-security-awareness-training-importance-building-habits-that-resist-attacks</loc>
    <lastmod>2026-03-11T05:17:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cc.baremetalcyber.com/episodes/welcome-to-the-isc2-certified-in-cybersecurity-audio-course</loc>
    <lastmod>2026-03-11T05:19:13Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
