<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://sameerfakhoury.com/</loc></url><url><loc>https://sameerfakhoury.com/about-me</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/a-daily-dive-into-cybersecurity-insights</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/access-control-lists-overview-in-active-directory</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/active-directory-the-forest-and-tree-structure</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/advanced-malware-detection-techniques-using-yara-rules-and-tools</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/are-tails-and-tor-your-ticket-to-online-privacy</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/building-an-effective-incident-handling-framework-prerequisites-and-strategies</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/cloud-security-best-practices</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/cracking-cyber-puzzles-the-excitement-of-digital-forensics-ctf</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/cracking-the-code-how-ctf-categories-boost-real-world-cybersecurity-skills</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/cracking-the-code-understanding-cryptography-and-quantum-computing-basics</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/deciphering-the-riddle-understanding-the-fundamentals-of-cyber-threat-intelligence</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/decoding-pythons-execution-process-from-source-code-to-bytecode</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/demystifying-git-a-comprehensive-guide-to-understanding-version-control</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/demystifying-systemd-the-heart-of-your-linux-system</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/demystifying-the-systemd-journal-structure-access-and-understanding-your-systems-log</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/discovering-the-art-of-social-engineering-protecting-your-cyber-world</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/dns-interrogation-and-zone-transfer-defense-overview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/effective-cybersecurity-strategies-prepare-and-protect</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-cyber-security-with-containers-and-docker</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-cybersecurity-awareness-through-training</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-cybersecurity-through-threat-hunting</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-cybersecurity-with-hashlib-in-python</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-cybersecurity-with-pycryptodome-in-python</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-network-security-tips-for-nmapmasscannessus-scans</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-network-security-with-siem-a-comprehensive-overview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/enhancing-security-and-detection-in-java-rmi-registry-with-bros-logs</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/evolution-of-security-operations-centers-from-soc-10-to-cognitive-soc</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploiting-smb-relay-attack-techniques-and-requirements</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploiting-vulnerabilities-in-outlook-web-access-owa</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-bitlocker-for-enhanced-data-security</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-blockchains-role-in-cybersecurity-safeguarding-digital-spaces-for-everyone</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-bwapp-a-buggy-web-application-for-cybersecurity-enthusiasts</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-flipper-zero-your-cybersecurity-sidekick</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-honeypots-cybersecuritys-sneaky-defenders</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-ietf-and-rfcs-in-cybersecurity</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-the-depths-of-dll-hijacking-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-the-essence-of-cti-standards-and-frameworks</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-the-power-of-cewl-a-must-have-tool-in-kali-linux-for-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/exploring-urlscanio-and-abusech-essential-tools-for-threat-intelligence</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/fireeye-a-cybersecurity-powerhouse-and-the-battle-against-advanced-threats</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/github-linking-your-local-git-repository-for-collaboration</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/give-your-old-computer-a-new-lease-on-life-with-antix-os</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/guarding-against-dns-vulnerabilities-the-vital-role-of-dnssec</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/how-dns-works-connecting-the-dots-for-internet-browsing</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/how-does-chatgpt-boost-cyber-security-defense</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/incident-response-containment-eradication-and-recovery-strategies</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/incident-response-planning-in-cybersecurity-managing-cyber-threats-effectively</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/investigating-anomalies-in-vpn-logs-with-kibana</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/key-components-and-functions-in-active-directory-fqdn-tombstones-ad-recycle-bin-and-sysvol</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/leveraging-paramiko-in-python-for-secure-remote-operations-in-cybersecurity</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/llmnr-and-nbns-networking-name-resolution-protocols</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/managing-cyber-threat-intelligence-with-opencti-an-overview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/mitigating-bgp-hijacking-strategies-and-tools-for-defending-internet-traffic</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/mobile-device-security-in-cybersecurity</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-autonomous-systems-routing-and-protocols</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-cybersecurity-scripting-and-programming-unveiled</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-online-safety-a-quick-guide-to-cybersecurity-risk-management</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-powershell-and-command-line-for-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-the-dark-web-under-the-internet</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-the-intelligence-cycle-from-data-to-actionable-insight</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/navigating-the-interplay-of-law-and-ethics-in-cyber-threat-intelligence</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/overview-of-google-dorks-information-gathering-tools-and-defense-techniques</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/post-incident-reflection-and-reporting-for-continuous-improvement</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/safeguarding-against-xss-and-obfuscated-javascript</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/secure-branch-offices-rodcs-replicate-ad-updates</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/securing-iot-devices-navigating-through-mirai-botnet-attacks</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/securing-webrtc-safeguarding-privacy-and-ip-addresses-in-browsers</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/securing-wireless-networks-against-war-driving-techniques-and-defenses</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/securing-your-online-presence-the-crucial-role-of-vpns-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/staying-safe-online-understanding-cyber-threats-and-defenses</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/streamlining-cybersecurity-incident-response</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/sublime-text-editor-a-handy-tool-for-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/the-growing-ransomware-threat-protecting-your-digital-assets</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/the-importance-of-multi-factor-authentication-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/the-power-of-pythons-socket-library-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/the-role-of-artificial-intelligence-in-cybersecurity-a-game-changer-on-the-digital-battlefield</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-active-directory-and-its-role-in-network-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-active-directory-identifiers-and-security-principals</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-active-directory-object-identification-and-global-catalog</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-active-directory-objects-attributes-schema-and-domain-structure</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-active-directory-user-enumeration-and-forest-organization</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-git-branching-and-merging</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-heartbleed-vulnerability-risks-detection-and-exploitation</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-ids-and-ips-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-incident-handling</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-insider-threat-detection-in-cybersecurity</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-memory-forensics-in-cyber-security</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-network-flows-monitoring-conversations-for-network-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-shellshock-vulnerability-and-cgi-programs-on-web-servers</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-splunk-an-introduction-to-siem-solutions</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-syslog-systemd-and-log-management-in-unix-like-systems</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-the-cyber-kill-chain</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-the-golden-ticket-attack-in-active-directory</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-the-pyramid-of-pain-in-cyber-threat-intelligence</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-unix-linux-debian-and-kali-linux-a-simple-guide</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-virtual-machines-vms-and-their-role-in-cybersecurity</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-war-dialing-and-modems-techniques-and-tools-for-network-exploration</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-whois-and-its-implications-for-domain-registrations</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/understanding-yaras-rule-based-malware-detection</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unlocking-cyber-insights-with-volatility-framework-v2</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unraveling-cyber-mysteries-how-digital-detectives-keep-networks-safe</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unraveling-cybersecurity-incidents-investigative-strategies-simplified</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unraveling-digital-mysteries-the-significance-of-autopsy-tools-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unraveling-the-mystery-red-rooms-on-the-dark-web-fact-or-fiction</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unveiling-cybersecurity-magic-with-scapy-python</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unveiling-the-digital-realm-navigating-the-depths-of-digital-forensics-and-web-browser-investigations</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unveiling-the-power-of-netcat-in-kali-linux-for-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unveiling-the-power-of-python-beautiful-soup-in-cybersecurity</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unveiling-the-power-of-the-requests-python-library-in-cyber-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/blog-posts/unveiling-the-secrets-a-brief-dive-into-disk-forensics-in-cyber-security</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-applying-encryption-in-cloud-services-cloud-computing-security-summary-ch7</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-effective-strategies-to-implement-iam-solutions-cloud-computing-security-summary-ch5</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-introduction-to-cloud-security-cloud-computing-security-summary-ch1</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-monitoring-and-auditing-your-cloud-environments-cloud-computing-security-summary-ch6</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-securing-compute-services-cloud-computing-security-summary-ch2</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-securing-networking-services-cloud-computing-security-summary-ch4</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-securing-storage-services-cloud-computing-security-summary-ch3</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/aws-understanding-common-cloud-security-threats-to-cloud-services-cloud-computing-security-summary-ch8</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/cloud-computing-security/cloud-computing-security-summaries</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-1-explore-identity-in-microsoft-entra-id</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-2-implement-an-identity-management-solution</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-2-implement-an-identity-management-solution/21-implement-initial-configuration-of-microsoft-entra-id</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-2-implement-an-identity-management-solution/22-create-configure-and-manage-identities</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-2-implement-an-identity-management-solution/23-implement-and-manage-external-identities</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-2-implement-an-identity-management-solution/24-implement-and-manage-hybrid-identity</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-2-implement-an-identity-management-solution/implement-an-identity-management-solution</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/31-secure-microsoft-entra-users-with-multifactor-authentication</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/32-manage-user-authentication</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/33-plan-implement-and-administer-conditional-access</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/34-manage-microsoft-entra-identity-protection</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/35-implement-access-management-for-azure-resources</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/36-deploy-and-configure-microsoft-entra-global-secure-access</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-3-implement-an-authentication-and-access-management-solution/implement-an-authentication-and-access-management-solution</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-4-implement-access-management-for-apps</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-4-implement-access-management-for-apps/41-plan-and-design-the-integration-of-enterprise-apps-for-sso</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-4-implement-access-management-for-apps/42-implement-and-monitor-the-integration-of-enterprise-apps-for-sso</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-4-implement-access-management-for-apps/43-implement-app-registration</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-4-implement-access-management-for-apps/44-register-apps-using-microsoft-entra-id</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-4-implement-access-management-for-apps/implement-access-management-for-apps</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy/51-plan-and-implement-entitlement-management</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy/52-plan-implement-and-manage-access-review</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy/53-plan-and-implement-privileged-access</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy/54-monitor-and-maintain-microsoft-entra-id</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy/55-explore-the-many-features-of-microsoft-entra-permissions-management</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/learning-path-5-plan-and-implement-an-identity-governance-strategy/plan-and-implement-an-identity-governance-strategy</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/mind-maps-for-microsoft-identity-and-access-administrator</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/external-course-summaries/sc-300-microsoft-certified-microsoft-identity-and-access-administrator/summary-for-sc-300-microsoft-identity-and-access-administrator</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/policy-design-and-analysis</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/policy-design-and-analysis/data-anonymization-summary</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/policy-design-and-analysis/password-in-linux-summary</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/policy-design-and-analysis/password-security-standards-summary</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/policy-design-and-analysis/policy-design-and-analysis-summaries</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/11-introduction-to-microsoft-defender-xdr-threat-protection</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/12-mitigate-incidents-using-microsoft-365-defender</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/13-protect-your-identities-with-microsoft-entra-id-protection</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/14-remediate-risks-with-microsoft-defender-for-office-365</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/15-safeguard-your-environment-with-microsoft-defender-for-identity</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/16-secure-your-cloud-apps-and-services-with-microsoft-defender-for-cloud-apps</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/mind-maps-for-mitigate-threats-using-microsoft-defender-xdr</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-1-mitigate-threats-using-microsoft-defender-xdr/mitigate-threats-using-microsoft-defender-xdr</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-10-perform-threat-hunting-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-10-perform-threat-hunting-in-microsoft-sentinel/explain-threat-hunting-concepts-in-microsoft-sentinel</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-10-perform-threat-hunting-in-microsoft-sentinel/hunt-for-threats-using-notebooks-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-10-perform-threat-hunting-in-microsoft-sentinel/perform-threat-hunting-in-microsoft-sentinel</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-10-perform-threat-hunting-in-microsoft-sentinel/threat-hunting-with-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-10-perform-threat-hunting-in-microsoft-sentinel/use-search-jobs-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security/21-fundamentals-of-generative-ai</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security/22-describe-microsoft-copilot-for-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security/23-describe-the-core-features-of-microsoft-copilot-for-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security/24-describe-the-embedded-experiences-of-microsoft-copilot-for-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security/mind-maps-for-mitigating-threats-using-microsoft-copilot-for-security</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-2-mitigate-threats-using-microsoft-copilot-for-security/mitigate-threats-using-microsoft-copilot-for-security</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/30-pre-course-essentials-key-notes-and-guide</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/31-respond-to-data-loss-prevention-alerts-using-microsoft-365</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/32-manage-insider-risk-in-microsoft-purview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/33-search-and-investigate-with-microsoft-purview-audit</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/34-investigate-threats-with-content-search-in-microsoft-purview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/mind-maps-for-mitigating-threats-using-microsoft-purview</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-3-mitigate-threats-using-microsoft-purview/mitigate-threats-using-microsoft-purview</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/41-protect-against-threats-with-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/42-deploy-the-microsoft-defender-for-endpoint-environment</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/43-implement-windows-security-enhancements-with-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/44-perform-device-investigations-in-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/45-perform-actions-on-a-device-using-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/46-perform-evidence-and-entities-investigations-using-microsoft-defender-for-endpoint</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/47-configure-and-manage-automation-using-microsoft-defender-for-endpoint</loc><lastmod>2025-08-17T19:40:17.959Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/48-configure-for-alerts-and-detections-in-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/49-utilize-vulnerability-management-in-microsoft-defender-for-endpoint</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/mind-map-for-mitigate-threats-using-microsoft-defender-for-endpoint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-4-mitigate-threats-using-microsoft-defender-for-endpoint/mitigate-threats-using-microsoft-defender-for-endpoint</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/51-plan-for-cloud-workload-protections-using-microsoft-defender-for-cloud</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/52-connect-azure-assets-to-microsoft-defender-for-cloud</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/53-connect-non-azure-resources-to-microsoft-defender-for-cloud</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/54-manage-your-cloud-security-posture-management</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/55-explain-cloud-workload-protections-in-microsoft-defender-for-cloud</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/56-remediate-security-alerts-using-microsoft-defender-for-cloud</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/mind-maps-for-mitigate-threats-using-microsoft-defender-for-cloud</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-5-mitigate-threats-using-microsoft-defender-for-cloud/mitigate-threats-using-microsoft-defender-for-cloud</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-6-create-queries-for-microsoft-sentinel-using-kusto-query-language-kql</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-6-create-queries-for-microsoft-sentinel-using-kusto-query-language-kql/61-construct-kql-statements-for-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-6-create-queries-for-microsoft-sentinel-using-kusto-query-language-kql/62-analyze-query-results-using-kql</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-6-create-queries-for-microsoft-sentinel-using-kusto-query-language-kql/63-build-multi-table-statements-using-kql</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-6-create-queries-for-microsoft-sentinel-using-kusto-query-language-kql/64-work-with-data-in-microsoft-sentinel-using-kusto-query-language</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-6-create-queries-for-microsoft-sentinel-using-kusto-query-language-kql/create-queries-for-microsoft-sentinel-using-kusto-query-language-kql</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/configure-your-microsoft-sentinel-environment</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/create-and-manage-microsoft-sentinel-workspaces</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/introduction-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/mind-maps-for-configure-your-microsoft-sentinel-environment</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/query-logs-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/use-watchlists-in-microsoft-sentinel</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-7-configure-your-microsoft-sentinel-environment/utilize-threat-intelligence-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-common-event-format-logs-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-data-to-microsoft-sentinel-using-data-connectors</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-logs-to-microsoft-sentinel</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-microsoft-defender-xdr-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-microsoft-services-to-microsoft-sentinel</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-syslog-data-sources-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-threat-indicators-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-8-connect-logs-to-microsoft-sentinel/connect-windows-hosts-to-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/automation-in-microsoft-sentinel</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/data-normalization-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/identify-threats-with-behavioral-analytics</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel-table-tracker</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/manage-content-in-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/mind-maps-for-create-detections-and-perform-investigations-using-microsoft-sentinel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/query-visualize-and-monitor-data-in-microsoft-sentinel</loc><lastmod>2025-08-17T19:40:17.959Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/security-incident-management-in-microsoft-sentinel</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/threat-detection-with-microsoft-sentinel-analytics</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/learning-path-9-create-detections-and-perform-investigations-using-microsoft-sentinel/threat-response-with-microsoft-sentinel-playbooks</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/sc-200-microsoft-certified-security-operations-analyst-associate/summary-for-sc-200-microsoft-certified-security-operations-analyst-associate</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/university-course-summaries</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/summary-web-programming-css-chapters-313233</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/summary-web-programming-html-p1-chapters-2122</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/summary-web-programming-html-p2-chapters-23123224</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/summary-web-programming-introduction-to-web-programming-chapters-1</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/summary-web-programming-javascript-chapters-41-42-43-44-45</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/web-programming-html-css-js-most-important-notes</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/course-summaries/web-programming-html-css-js/web-programming-summaries-html-css-js</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/atlas-tour</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/devsecfun</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/keefiy</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/lankdoon</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/leakerjo</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/matrixescape</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/miami-deal</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/osint-ncscctfv4-2025-writeups</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/semoctffun</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/skidz</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/the-arab-revolt</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/osint-ncscctfv4-2025-writeups/the-truck</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/bashcape</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/bashcraft</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/covertbyte</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/dotidot</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/for0for</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/origin-trace</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/raj</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/snared</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/whoami</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/yuctf-writeup-section</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/ctf-categories/yuctf-2025-writeups/zamap</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf/0xl4ughctf-writups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf/jabalya</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf/khan-yunis</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf/nablus</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf/ramallah</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/0xl4ughctf/welcome</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/al-balqa-applied-university-bau-ctf-online-competition</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/al-balqa-applied-university-bau-ctf-onsite-competition</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/al-balqa-applied-university-bau-ctf-onsite-competition/whats-behind-that-graph-misc</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/al-balqa-applied-university-bau-osint-ctf-training</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/blogpost</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/blogpost2</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/black-hat</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/darkwebdump</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/deadface-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/feeling-lucky</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/glo-clouds</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/mama-y-papa</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/nice-vacation</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/rebel</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/reveal-mirveal</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/settle-in-the-presence-of-evil</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/deadface/take-a-seat-upon-the-throne</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/distribution</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/find-me</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/fsociety00dat</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/hackappatoi</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/hackappatoi/hackappatoi-writups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/hackappatoi/italian-mailsorigins</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/hackappatoi/the-meninges</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/hackappatoi/why-notnaples</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/leaked-song</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/nbctf</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/nbctf/babbling-about</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/nbctf/linkedout-1</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/nbctf/linkedout-3</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/nbctf/nbctf-writups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/old-but-gold</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/osint-1-tryhackme-searchlight-imint</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/osint-2-solving-ctf-osint-questions-and-important-tools</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/osint-online-ctf-competition-writeups</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/osint-tryhackme-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/repo</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/sabe3</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/snow-man</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/tryhackme-ctf-collection-vol1</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/tryhackme-sakura-room</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/whereami</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/xpandctf</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/xpandctf/digital-footprint-1</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/xpandctf/stolen</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/xpandctf/the-code-mystery</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/ctf-writeups/open-source-intelligence-writeups/xpandctf/xpandctf-writeups</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub</loc><lastmod>2025-12-20T10:51:17.265Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles</loc><lastmod>2026-02-23T20:09:30.548Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/can-ai-impersonate-you-from-a-cyber-security-perspective</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights</loc><lastmod>2026-02-23T20:09:30.548Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/chatgpts-dynamic-duo-the-double-automation-tagging-system</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/deep-dive-into-outlook-autodiscover-how-clients-locate-authenticate-and-connect-to-exchange-in-domain-and-non-domain-joined-devices-and-how-to-defend-against-password-spray-attacks</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/from-hunter-to-hunted-the-clipboards-hidden-danger</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/hacking-privileged-docker-containers-capabilities-exploitation</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/1</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/10</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/11</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/12</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/13</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/14</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/15</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/16</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/2</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/3</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/4</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/5</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/6</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/7</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/8</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/9</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/characters</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/numbers</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/numbers-symbols-characters</loc><lastmod>2025-11-19T08:05:51.804Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-complexity</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-complexity-continuing-on-a3a7g</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity</loc><lastmod>2025-08-17T19:40:17.959Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/1</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/2</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/3</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/4</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/5</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/6</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/7</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-cracker-time-complexity/8</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-stage-1</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/password-stages</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/symbols</loc><lastmod>2025-12-01T05:55:40.621Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/mathematical-foundations-for-estimating-cracking-time-in-password-creation-methodology/time-conversions</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/microsoft-pme-architecture-workflow-and-osint-insights-from-metadata-exposure</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/aboutme</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/advancedexplanation</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/bulletsummary</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/chatgpt-tagging-system-repository</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/codebullets</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/codenumerical</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/codesummary</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/codingtheme</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/defangingdomain</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/detailedpicture</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/headingsummary</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/humantext</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/intermediateexplanation</loc><lastmod>2025-11-06T16:10:01.407Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/longexample</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/mediumexample</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/miniexample</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/numericalsummary</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/simpleexplanation</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/simplepicture</loc><lastmod>2025-09-16T14:12:49.447Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/translatearabic</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/notion-mind-map-chatgpt-tagging-repository-extravaganza/translateenglish</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/quick-assist-quicker-hack-lolbins-the-double-edged-sword-of-cybersecurity</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/the-aura-is-fading-the-human-cost-of-ai-in-cybersecurity-in-2026</loc><lastmod>2026-02-23T20:09:32.909Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/the-chips-n-crisp-unveiling-the-mysteries-of-chcp</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/articles/tech-insights/windows-forensics-unleashed-automated-artifact-harvesting-and-seamless-splunk-integration-via-universal-forwarding</loc><lastmod>2026-02-23T19:58:20.498Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/bootcamps-resources</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/massarv9-threat-logs</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-13-introduction-to-blue-team</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-14-incident-handlingresponse</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-15-incident-handlingresponse-part-2</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-16-digital-forensics</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-17-digital-forensics-part-2</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-18-secure-configuration-management-scm</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-19-secure-configuration-management-scm-part-2</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-20-threat-intelligence-and-threat-hunting</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/bootcamps/ncsc-massarv9-blue-teaming-extended-notes/session-21-threat-intelligence-and-threat-hunting-part-2</loc><lastmod>2025-12-20T10:51:34.400Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/cyber-reports</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/cyber-reports/cyber-reports-for-the-multi-course-adventure</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/cyber-reports/practical-malware-analysis-triage-malware-analysis-report-wannacryexe</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/devfest-amman-talk-2024-building-profitable-saas-businesses-and-leveraging-ai-and-cloud-for-success-event-notes-summary</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/devfest-2025-amman-insights-on-google-antigravity-firebase-gitops-and-modern-web-development</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel/get-started-with-security-command-center</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel/google-security-operations-fundamentals</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel/mini-quiz</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel/references</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel/the-central-hub-for-passkeys-google-scc-secops-and-mandiant-threat-intel</loc><lastmod>2025-09-16T14:13:23.728Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/from-passkeys-to-unified-identity-and-cloud-security-navigating-google-scc-secops-and-mandiant-threat-intel/the-evolution-of-identity-authentication-from-passwords-to-passkeys</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/google-io-2025-modern-identity-authentication-faster-sign-ins-and-next-gen-secure-credentials</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/google-io-2025-modern-identity-authentication-faster-sign-ins-and-next-gen-secure-credentials/authentication-and-authorization-concepts-and-workflow</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/google-io-2025-modern-identity-authentication-faster-sign-ins-and-next-gen-secure-credentials/google-authentication-and-authorization-solutions</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/google-io-2025-modern-identity-authentication-faster-sign-ins-and-next-gen-secure-credentials/resources-used-for-authentication-and-authorization</loc><lastmod>2025-12-20T10:42:34.430Z</lastmod></url><url><loc>https://sameerfakhoury.com/the-resource-hub/event-notes/event-insights-key-takeaways-and-notes/google-io-2025-modern-identity-authentication-faster-sign-ins-and-next-gen-secure-credentials/the-central-hub-for-authentication-and-authorization</loc><lastmod>2025-08-18T16:22:55.264Z</lastmod></url></urlset>