<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://isa.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/academy-course-hub</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T02:49:07Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-58-triage-noisy-alerts-and-prioritize-rapid-response</loc>
    <lastmod>2026-03-29T04:59:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-57-correlate-logs-and-proactively-hunt-emerging-threats</loc>
    <lastmod>2026-03-29T04:59:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-56-plan-evidence-collection-and-credible-sampling-approaches</loc>
    <lastmod>2026-03-29T04:59:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-55-verify-aocs-and-contractual-requirements-with-rigor</loc>
    <lastmod>2026-03-29T04:58:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-54-control-third-party-access-and-high-risk-integrations</loc>
    <lastmod>2026-03-29T04:58:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-53-protect-supporting-services-like-dns-and-ntp</loc>
    <lastmod>2026-03-29T04:58:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-52-secure-network-infrastructure-routers-and-firewalls-comprehensively</loc>
    <lastmod>2026-03-29T04:58:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-51-harden-endpoints-laptops-and-high-risk-workstations</loc>
    <lastmod>2026-03-29T04:57:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-50-evaluate-virtualization-platforms-and-hypervisor-attack-surfaces</loc>
    <lastmod>2026-03-29T04:57:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-49-secure-containers-and-serverless-production-workloads-effectively</loc>
    <lastmod>2026-03-29T04:54:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-48-validate-scoping-boundaries-for-cloud-responsibilities-precisely</loc>
    <lastmod>2026-03-29T04:53:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-47-safeguard-e-commerce-payment-pages-against-e-skimming</loc>
    <lastmod>2026-03-29T04:53:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-46-secure-backups-restoration-and-disaster-recovery-pathways</loc>
    <lastmod>2026-03-29T04:46:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-45-inventory-assets-and-classify-data-for-control-strength</loc>
    <lastmod>2026-03-29T04:45:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-44-document-policies-standards-and-enforceable-procedures-clearly</loc>
    <lastmod>2026-03-29T04:45:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-43-train-personnel-on-role-specific-secure-operations</loc>
    <lastmod>2026-03-29T04:45:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-42-maintain-forensic-readiness-and-clean-evidence-handling</loc>
    <lastmod>2026-03-29T04:44:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-41-build-incident-response-and-escalation-playbooks-that-work</loc>
    <lastmod>2026-03-29T04:44:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-40-detect-unauthorized-change-across-critical-files-automatically</loc>
    <lastmod>2026-03-29T04:43:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-39-synchronize-system-time-to-preserve-audit-trails</loc>
    <lastmod>2026-03-29T04:43:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-38-standardize-passwords-and-modern-authenticator-policies-organization-wide</loc>
    <lastmod>2026-03-29T04:42:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-37-secure-wireless-networks-controllers-and-management-planes</loc>
    <lastmod>2026-03-29T04:41:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-36-protect-p2pe-and-end-to-end-encryption-deployments</loc>
    <lastmod>2026-03-29T04:41:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-35-rotate-keys-manage-escrow-and-revoke-safely</loc>
    <lastmod>2026-03-29T04:40:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-34-operate-encryption-keys-under-strict-dual-control</loc>
    <lastmod>2026-03-29T04:40:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-33-govern-cryptography-across-its-complete-lifecycle</loc>
    <lastmod>2026-03-29T04:40:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-32-harden-databases-and-sensitive-data-repositories-thoroughly</loc>
    <lastmod>2026-03-29T04:39:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-31-deploy-tune-and-govern-web-application-firewalls</loc>
    <lastmod>2026-03-29T04:39:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-30-lock-down-web-applications-and-exposed-apis</loc>
    <lastmod>2026-03-29T04:39:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-29-embed-secure-software-development-practices-teams-follow</loc>
    <lastmod>2026-03-29T04:38:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-28-manage-change-and-configuration-with-disciplined-workflows</loc>
    <lastmod>2026-03-29T04:38:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-27-validate-segmentation-effectiveness-with-rigorous-testing</loc>
    <lastmod>2026-03-29T04:37:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-26-execute-penetration-testing-with-meaningful-risk-based-scope</loc>
    <lastmod>2026-03-29T04:37:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-25-conduct-internal-and-external-vulnerability-scans-effectively</loc>
    <lastmod>2026-03-29T04:37:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-24-monitor-security-events-and-tune-actionable-alerts</loc>
    <lastmod>2026-03-29T04:37:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-23-centralize-logging-and-retain-credible-forensic-evidence</loc>
    <lastmod>2026-03-29T04:36:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-22-control-physical-access-to-sensitive-facilities-reliably</loc>
    <lastmod>2026-03-29T04:36:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-21-secure-remote-access-and-hardened-administrative-pathways</loc>
    <lastmod>2026-03-29T04:36:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-20-require-strong-multifactor-authentication-across-all-users</loc>
    <lastmod>2026-03-29T04:35:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-19-enforce-least-privilege-and-true-need-to-know-access</loc>
    <lastmod>2026-03-29T04:35:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-18-run-vulnerability-management-continuously-without-blind-spots</loc>
    <lastmod>2026-03-29T04:35:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-17-prevent-detect-and-contain-malware-before-impact</loc>
    <lastmod>2026-03-29T04:34:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-16-encrypt-data-in-transit-everywhere-every-time</loc>
    <lastmod>2026-03-29T04:34:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-15-protect-stored-account-data-from-unauthorized-exposure</loc>
    <lastmod>2026-03-29T04:34:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-14-enforce-secure-configuration-baselines-without-configuration-drift</loc>
    <lastmod>2026-03-29T04:34:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-13-implement-robust-network-security-controls-that-hold</loc>
    <lastmod>2026-03-29T04:33:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-12-engineer-compensating-controls-assessors-actually-approve</loc>
    <lastmod>2026-03-29T04:33:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-11-perform-targeted-risk-analyses-that-drive-decisions</loc>
    <lastmod>2026-03-29T04:33:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-10-apply-the-pci-customized-approach-correctly-decisively</loc>
    <lastmod>2026-03-29T04:33:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-9-govern-service-providers-and-shared-responsibility-rigorously</loc>
    <lastmod>2026-03-29T04:32:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-8-minimize-scope-using-tokenization-and-truncation-wisely</loc>
    <lastmod>2026-03-29T04:32:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-7-prove-network-segmentation-truly-isolates-the-cde</loc>
    <lastmod>2026-03-29T04:32:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-6-map-end-to-end-payment-data-flows-clearly</loc>
    <lastmod>2026-03-29T04:31:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-5-hunt-cardholder-data-across-every-environment</loc>
    <lastmod>2026-03-29T04:31:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-4-define-pci-roles-and-nail-precise-scope</loc>
    <lastmod>2026-03-29T04:31:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-3-lock-in-a-realistic-spoken-study-plan</loc>
    <lastmod>2026-03-29T04:30:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-2-master-scoring-policies-and-high-yield-test-tactics</loc>
    <lastmod>2026-03-29T04:30:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/episode-1-crack-the-isa-exam-blueprint-with-confidence</loc>
    <lastmod>2026-03-29T04:30:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://isa.baremetalcyber.com/episodes/welcome-to-certified-the-internal-security-assessor-isa-audio-course</loc>
    <lastmod>2026-03-29T04:29:47Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
