<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gisf.baremetalcyber.com/</loc>
    <lastmod>2026-03-16T23:56:48Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-16T23:56:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-16T23:56:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-16T23:56:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-16T23:56:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-16T23:56:48Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-1-orient-to-gisf-exam-structure-scoring-timing-and-question-style</loc>
    <lastmod>2026-02-15T01:56:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-2-know-the-rules-proctoring-open-book-boundaries-and-allowed-resources</loc>
    <lastmod>2026-02-15T01:56:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-3-build-a-spoken-gisf-study-plan-using-spaced-recall-and-indexing</loc>
    <lastmod>2026-02-15T01:56:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-4-define-foundations-of-cybersecurity-and-why-security-matters-to-business</loc>
    <lastmod>2026-02-15T01:56:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-5-map-assets-threats-vulnerabilities-and-controls-with-foundations-of-cybersecurity</loc>
    <lastmod>2026-02-15T01:57:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-6-practice-risk-fundamentals-likelihood-impact-and-risk-treatment-choices</loc>
    <lastmod>2026-02-15T01:57:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-7-translate-security-policies-standards-and-procedures-into-everyday-cybersecurity-actions</loc>
    <lastmod>2026-02-15T01:57:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-8-spaced-retrieval-foundations-of-cybersecurity-and-risk-fundamentals-rapid-recall</loc>
    <lastmod>2026-02-15T01:58:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-9-manage-and-mitigate-cyber-risk-with-practical-control-prioritization</loc>
    <lastmod>2026-02-15T01:58:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-10-use-cyber-risk-frameworks-to-align-security-work-to-business-goals</loc>
    <lastmod>2026-02-15T01:58:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-11-navigate-laws-regulations-and-compliance-drivers-that-shape-cyber-risk</loc>
    <lastmod>2026-02-15T01:59:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-12-apply-ethics-and-professional-judgment-when-security-decisions-get-messy</loc>
    <lastmod>2026-02-15T01:59:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-13-spaced-retrieval-cyber-risk-governance-compliance-and-ethics-memory-sprint</loc>
    <lastmod>2026-02-15T01:59:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-14-master-symmetric-encryption-basics-for-foundations-of-cryptography-and-digital-trust</loc>
    <lastmod>2026-02-15T02:00:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-15-explain-hashing-integrity-and-secure-password-storage-in-digital-trust</loc>
    <lastmod>2026-02-15T02:00:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-16-understand-asymmetric-crypto-key-pairs-and-digital-signatures-for-trust</loc>
    <lastmod>2026-02-15T02:00:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-17-demystify-certificates-pki-and-trust-chains-that-power-secure-communication</loc>
    <lastmod>2026-02-15T02:01:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-18-spaced-retrieval-cryptography-and-digital-trust-concepts-you-must-recall</loc>
    <lastmod>2026-02-15T02:21:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-19-build-a-mental-model-of-osi-and-tcp-ip-data-flow</loc>
    <lastmod>2026-02-15T02:01:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-20-grasp-ip-addressing-and-routing-paths-in-foundations-of-network-communication</loc>
    <lastmod>2026-02-15T02:20:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-21-decode-dns-and-dhcp-mechanics-that-help-devices-find-each-other</loc>
    <lastmod>2026-02-15T02:04:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-22-tell-the-story-of-tcp-udp-and-web-communication-handshakes</loc>
    <lastmod>2026-02-15T02:03:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-23-spaced-retrieval-network-communication-essentials-as-a-spoken-traffic-walkthrough</loc>
    <lastmod>2026-02-15T02:03:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-24-design-network-security-and-architecture-with-segmentation-and-security-zones</loc>
    <lastmod>2026-02-15T02:03:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-25-choose-firewalls-proxies-and-filtering-strategies-in-network-security-architecture</loc>
    <lastmod>2026-02-15T02:05:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-26-secure-remote-access-with-vpns-and-encrypted-tunnels-without-confusion</loc>
    <lastmod>2026-02-15T02:05:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-27-operationalize-zero-trust-principles-in-modern-network-security-and-architecture</loc>
    <lastmod>2026-02-15T02:05:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-28-spaced-retrieval-network-security-architecture-controls-and-common-misconfigurations</loc>
    <lastmod>2026-02-15T02:05:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-29-strengthen-identity-access-and-data-protection-with-modern-authentication-and-mfa</loc>
    <lastmod>2026-02-15T02:06:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-30-clarify-authorization-decisions-using-rbac-abac-and-least-privilege-thinking</loc>
    <lastmod>2026-02-15T02:06:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-31-control-identity-lifecycle-provisioning-deprovisioning-and-privileged-access-management</loc>
    <lastmod>2026-02-15T02:07:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-32-deploy-data-loss-prevention-concepts-purpose-types-and-integration-with-iam</loc>
    <lastmod>2026-02-15T02:07:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-33-spaced-retrieval-identity-access-and-dlp-fast-recall-with-mini-scenarios</loc>
    <lastmod>2026-02-15T02:08:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-34-recognize-intrusion-and-initial-access-techniques-from-recon-to-targeting</loc>
    <lastmod>2026-02-15T02:08:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-35-defend-against-phishing-and-social-engineering-as-initial-access-gateways</loc>
    <lastmod>2026-02-15T02:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-36-spot-exploitation-paths-through-vulnerabilities-misconfigurations-and-weak-credentials</loc>
    <lastmod>2026-02-15T02:09:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-37-detect-malware-delivery-persistence-footholds-and-early-intrusion-indicators</loc>
    <lastmod>2026-02-15T02:09:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-38-spaced-retrieval-initial-access-techniques-and-defensive-clues-for-quick-recognition</loc>
    <lastmod>2026-02-15T02:09:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-39-turn-attacker-behavior-into-clear-notes-with-adversary-analysis-methods</loc>
    <lastmod>2026-02-15T02:10:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-40-map-ttps-using-mitre-att-ck-within-adversary-analysis-and-threat-frameworks</loc>
    <lastmod>2026-02-15T02:10:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-41-anticipate-next-moves-with-kill-chain-and-diamond-model-threat-frameworks</loc>
    <lastmod>2026-02-15T02:10:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-42-prioritize-intelligence-indicators-observables-and-the-pyramid-of-pain</loc>
    <lastmod>2026-02-15T02:10:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-43-spaced-retrieval-threat-frameworks-recap-through-rapid-adversary-story-prompts</loc>
    <lastmod>2026-02-15T02:11:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-44-build-a-defensive-technologies-stack-from-logs-telemetry-and-alerts</loc>
    <lastmod>2026-02-15T02:11:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-45-work-smarter-with-siem-correlation-and-scalable-alert-triage-workflows</loc>
    <lastmod>2026-02-15T02:12:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-46-understand-edr-and-ndr-visibility-for-defensive-technologies-and-emerging-intelligence</loc>
    <lastmod>2026-02-15T02:12:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-47-leverage-automation-and-ai-in-defense-while-avoiding-dangerous-overtrust</loc>
    <lastmod>2026-02-15T02:12:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-48-spaced-retrieval-defensive-technologies-recall-and-triage-decision-practice</loc>
    <lastmod>2026-02-15T02:12:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-49-identify-privilege-escalation-and-credential-theft-in-post-exploitation-techniques</loc>
    <lastmod>2026-02-15T02:13:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-50-trace-lateral-movement-and-internal-discovery-in-advanced-threat-techniques</loc>
    <lastmod>2026-02-15T02:13:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-51-understand-command-and-control-and-living-off-the-land-stealth</loc>
    <lastmod>2026-02-15T02:13:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-52-recognize-data-exfiltration-patterns-and-advanced-threat-techniques-at-scale</loc>
    <lastmod>2026-02-15T02:14:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-53-spaced-retrieval-post-exploitation-tactics-and-detection-cues-rapid-review</loc>
    <lastmod>2026-02-15T02:14:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-54-adopt-the-shared-responsibility-mindset-for-securing-connected-and-cloud-based-environments</loc>
    <lastmod>2026-02-15T02:14:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-55-harden-cloud-identity-keys-and-access-guardrails-for-data-protection</loc>
    <lastmod>2026-02-15T02:14:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-56-secure-data-in-cloud-storage-and-saas-workflows-without-losing-control</loc>
    <lastmod>2026-02-15T02:15:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-57-reduce-connected-device-and-iot-risk-through-isolation-updates-and-monitoring</loc>
    <lastmod>2026-02-15T02:15:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-58-identify-fundamental-web-security-risks-in-security-foundations-and-awareness</loc>
    <lastmod>2026-02-15T02:15:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-59-coordinate-security-roles-to-strengthen-organizational-posture-and-shared-accountability</loc>
    <lastmod>2026-02-15T02:16:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-60-build-security-awareness-habits-that-reduce-real-risk-across-teams</loc>
    <lastmod>2026-02-15T02:16:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-61-spaced-retrieval-web-risks-roles-and-awareness-concepts-in-one-drill</loc>
    <lastmod>2026-02-15T02:16:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-62-exam-acronyms-high-yield-audio-reference-for-the-gisf-blueprint</loc>
    <lastmod>2026-02-15T02:16:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-63-essential-terms-plain-language-glossary-for-fast-recall-under-pressure</loc>
    <lastmod>2026-02-15T02:17:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/episode-64-exam-day-tactics-calm-pacing-smart-elimination-and-confident-final-checks</loc>
    <lastmod>2026-02-15T02:17:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gisf.baremetalcyber.com/episodes/welcome-to-the-giac-gisf-audio-course</loc>
    <lastmod>2026-02-15T02:22:38Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
