<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero</loc>
				<priority>1</priority>
				<lastmod>2026-02-16T17:58:07.942Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.1-understand-adhere-to-and-promote-professional-ethics</loc>
				<priority>1</priority>
				<lastmod>2026-03-19T05:37:25.895Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.2-understand-and-apply-security-concepts</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.3-evaluate-apply-and-sustain-security-governance-principles</loc>
				<priority>1</priority>
				<lastmod>2026-02-19T07:49:03.811Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.4-understand-legal-regulatory-compliance-issues-that-pertain-to-infosec-in-a-holistic-context</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T07:36:03.318Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.5-understand-requirements-for-investigation-types-i.e.-administrative-criminal-civil-regulatory-in</loc>
				<priority>1</priority>
				<lastmod>2026-02-19T07:11:01.589Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.6-develop-document-and-implement-security-policy-standards-procedures-and-guidelines</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.7-identify-analyze-assess-prioritize-and-implement-business-continuity-bc-requirements</loc>
				<priority>1</priority>
				<lastmod>2026-03-18T17:32:47.377Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.8-contribute-to-and-enforce-personnel-security-policies-and-procedures</loc>
				<priority>1</priority>
				<lastmod>2026-03-10T06:10:37.651Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.9-understand-and-apply-risk-management-concepts</loc>
				<priority>1</priority>
				<lastmod>2026-03-06T10:10:40.350Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.10-understand-and-apply-threat-modeling-concepts-and-methodologies</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.11-apply-supply-chain-risk-management-scrm-concepts</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.12-establish-and-maintain-a-security-awareness-education-and-training-program</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.d.1-how-service-owners-legal-teams-cisos-and-privacy-officers-can-collaborate-effectively-without</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.d.2-understanding-patents-copyrights-and-trademarks-without-falling-asleep</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.d.3-acceptable-use-policy-aup</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.d.4-non-disclosure-agreement-nda</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.d.5-service-level-agreement-sla</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.d.7-a-technical-deep-dive-into-the-nis2-directive</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.l.1-github-as-a-learning-tool</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.l.2-locking-down-rdp-expert-level-setup-ports-authentication-and-monitoring</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.l.3-risk-matrix-and-risk-register</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.l.4-windows-cli-for-security-beginners</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/1.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.1-identify-and-classify-information-and-assets</loc>
				<priority>1</priority>
				<lastmod>2026-03-19T05:50:28.556Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.2-establish-information-and-asset-handling-requirements</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.3-provision-information-and-assets-securely</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.4-manage-data-lifecycle</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:30:25.724Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.5-ensure-appropriate-asset-retention</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:30:25.724Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.6-determine-data-security-controls-and-compliance-requirements</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T13:58:15.772Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.d.1-mastering-configuration-management-the-hidden-shield-of-your-it-security</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.d.2-mobile-wallets-e.g.-apple-pay-google-pay-tokenization-in-action</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.d.3-digital-rights-management</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/2.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-1</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-1</loc>
				<priority>1</priority>
				<lastmod>2026-02-11T17:09:33.176Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.1-research-implement-and-manage-engineering-processes-using-secure-design-principles</loc>
				<priority>1</priority>
				<lastmod>2026-04-02T06:41:09.596Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.2-understand-the-fundamental-concepts-of-security-models-e.g.-biba-star-model-bell-lapadula</loc>
				<priority>1</priority>
				<lastmod>2026-04-04T08:12:28.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.3-select-controls-based-upon-system-security-requirements</loc>
				<priority>1</priority>
				<lastmod>2026-04-04T08:12:28.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.4-understand-security-capabilities-of-information-systems-e.g.-memory-protection-tpm-...</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T10:42:53.634Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.5-assess-and-mitigate-the-vulnerabilities-of-security-architectures-designs-and-solution-elements</loc>
				<priority>1</priority>
				<lastmod>2026-04-04T08:12:28.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.6-select-and-determine-cryptographic-solutions</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T15:35:00.990Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.7-understand-methods-of-cryptanalytic-attacks</loc>
				<priority>1</priority>
				<lastmod>2026-04-05T15:47:39.293Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.8-apply-security-principles-to-site-and-facility-design</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T15:35:00.990Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.9-design-site-and-facility-security-controls</loc>
				<priority>1</priority>
				<lastmod>2026-03-05T21:13:36.124Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.10-manage-the-information-system-lifecycle</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T16:33:36.743Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.d.1-system-design-basics</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.d.2-understanding-how-common-iot-sensors-work</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.d.3-ip-surveillance-cameras-technical-overview</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/3.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-2</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-2</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:54:52.311Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.1-apply-secure-design-principles-in-network-architectures</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T19:48:00.529Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.2-secure-network-component</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T07:36:03.318Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.3-implement-secure-communication-channels-according-to-design</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T08:21:39.973Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.d.1-ipv4-addressing-and-subnetting</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T08:21:39.973Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.d.2-dns</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T08:21:39.973Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.l.1-first-steps-with-wireshark</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T08:21:39.973Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.l.2-understanding-netflow-snmp-and-syslog</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T08:21:39.973Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:59:50.415Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/4.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:59:50.415Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-3</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:59:50.415Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-3</loc>
				<priority>1</priority>
				<lastmod>2026-02-12T17:59:50.415Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.0-preface</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.1-control-physical-and-logical-access-to-assets</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.2-design-identification-and-authentication-strategy-e.g.-people-devices-and-services</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.3-federated-identity-with-a-third-party-service</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.4-implement-and-manage-authorization-mechanisms</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.5-manage-the-identity-and-access-provisioning-lifecycle</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.6-implement-authentication-systems</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.d.1-fido-and-fido2-revolutionizing-authentication</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.d.2-recap-of-nist-special-publication-sp-800-63b-4-digital-identity-guidelines-authentication-and</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/5.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-4</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-4</loc>
				<priority>1</priority>
				<lastmod>2026-02-13T13:48:35.534Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.1-design-and-validate-assessment-test-and-audit-strategy</loc>
				<priority>1</priority>
				<lastmod>2026-02-21T07:06:04.049Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.2-conduct-security-controls-testing</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.3-collect-security-process-data-e.g.-technical-and-administrative</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.4-analyze-test-output-and-generate-report</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.5-conduct-or-facilitate-security-audits</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.d.1-iso-19011-the-unsung-hero-of-infosec-audits</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.d.2-the-hidden-diary-of-hackers-understanding-cves</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/6.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-5</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-5</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.1-understand-and-comply-with-investigations</loc>
				<priority>1</priority>
				<lastmod>2026-03-06T14:44:39.275Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.2-conduct-logging-and-monitoring-activities</loc>
				<priority>1</priority>
				<lastmod>2026-02-16T17:58:07.942Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.3-perform-configuration-management-cm-e.g.-provisioning-baselining-automation</loc>
				<priority>1</priority>
				<lastmod>2026-03-06T17:02:23.971Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.4-apply-foundational-security-operations-concepts</loc>
				<priority>1</priority>
				<lastmod>2026-02-26T16:33:41.983Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.5-apply-resource-protection</loc>
				<priority>1</priority>
				<lastmod>2026-03-06T14:44:39.275Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.6-conduct-incident-management</loc>
				<priority>1</priority>
				<lastmod>2026-03-07T07:09:24.505Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.7-operate-and-maintain-detection-and-preventative-measures</loc>
				<priority>1</priority>
				<lastmod>2026-03-18T17:32:47.377Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.8-implement-and-support-patch-and-vulnerability-management</loc>
				<priority>1</priority>
				<lastmod>2026-03-07T07:09:24.505Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.9-understand-and-participate-in-change-management-processes</loc>
				<priority>1</priority>
				<lastmod>2026-03-06T17:02:23.971Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.10-implement-recovery-strategies</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T14:53:30.595Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.11-implement-disaster-recovery-dr-processes</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.12-test-disaster-recovery-plan-drp</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.13-participate-in-business-continuity-planning-and-exercises</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.14-implement-and-manage-physical-security</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.15-address-personnel-safety-and-security-concerns</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/7.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-6</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-6</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.1-understand-and-integrate-security-in-the-software-development-life-cycle-sdlc</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.2-identify-and-apply-security-controls-in-software-development-ecosystems</loc>
				<priority>1</priority>
				<lastmod>2026-03-06T17:02:23.971Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.3-assess-the-effectiveness-of-software-security</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.4-assess-security-impact-of-acquired-software</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.5-define-and-apply-secure-coding-guidelines-and-standards</loc>
				<priority>1</priority>
				<lastmod>2026-02-20T20:19:00.608Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.d.1-databases-basics</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.q.1-easy-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/8.q.2-hard-questions</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/dictionary-7</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/flashcards-7</loc>
				<priority>1</priority>
				<lastmod>2026-02-15T17:32:43.109Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/license</loc>
				<priority>1</priority>
				<lastmod>2026-02-21T16:02:13.365Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/support</loc>
				<priority>1</priority>
				<lastmod>2026-02-21T16:02:13.365Z</lastmod>
</url>

			<url>
				<loc>https://theinfosecvault.gitbook.io/cissp-zero-to-hero/thanks</loc>
				<priority>1</priority>
				<lastmod>2026-03-31T17:03:33.084Z</lastmod>
</url>


</urlset>
