<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.academycyber.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.academycyber.com/sizma-testlerinde-kullanilan-en-etkili-araclar-ve-teknikler/</loc><lastmod>2025-07-03T11:48:53+03:00</lastmod></url><url><loc>https://www.academycyber.com/siber-guvenlik-anatomisi/</loc><lastmod>2025-07-04T09:32:17+03:00</lastmod></url><url><loc>https://www.academycyber.com/soc-analistligi-nedir-soc-kariyeri-icin-bilmeniz-gerekenler/</loc><lastmod>2025-07-04T09:39:52+03:00</lastmod></url><url><loc>https://www.academycyber.com/edr-xdr-mdr-hangisini-kullanmalisiniz/</loc><lastmod>2025-07-04T09:46:02+03:00</lastmod></url><url><loc>https://www.academycyber.com/siber-guvenlik-sertifikalari-ceh-oscp-cissp-karsilastirmasi/</loc><lastmod>2025-07-04T10:32:09+03:00</lastmod></url><url><loc>https://www.academycyber.com/cyber-security-ne-demek-siber-guvenlik-temelleri/</loc><lastmod>2025-07-04T10:36:05+03:00</lastmod></url><url><loc>https://www.academycyber.com/kali-linux-siber-guvenlik-uzmanlari-icin-14-temel-arac/</loc><lastmod>2025-07-04T10:37:43+03:00</lastmod></url><url><loc>https://www.academycyber.com/data-nedir-gunumuzun-dijital-altini/</loc><lastmod>2025-07-04T15:47:06+03:00</lastmod></url><url><loc>https://www.academycyber.com/siber-guvenlik-tehditlerden-korunma-yontemleri/</loc><lastmod>2025-07-04T10:40:56+03:00</lastmod></url><url><loc>https://www.academycyber.com/wireshark-ile-ag-trafigi-analizi-baslangic-rehberi/</loc><lastmod>2025-07-04T15:36:51+03:00</lastmod></url><url><loc>https://www.academycyber.com/iso-270012022-bilgi-guvenligi-yonetim-sistemi-nedir/</loc><lastmod>2025-07-04T15:26:57+03:00</lastmod></url><url><loc>https://www.academycyber.com/guven-damgasi/</loc><lastmod>2025-07-04T15:17:58+03:00</lastmod></url><url><loc>https://www.academycyber.com/vmware-fusion-ile-sanal-test-ortami-kurulumu/</loc><lastmod>2025-07-04T14:48:13+03:00</lastmod></url><url><loc>https://www.academycyber.com/kali-linux-ile-sizma-testlerine-giris/</loc><lastmod>2025-07-04T14:45:30+03:00</lastmod></url><url><loc>https://www.academycyber.com/wireshark-kullanarak-ag-trafigi-analizi/</loc><lastmod>2025-07-04T14:44:49+03:00</lastmod></url><url><loc>https://www.academycyber.com/openvas-ile-ag-zafiyet-taramasi-nasil-yapilir/</loc><lastmod>2025-07-04T14:28:53+03:00</lastmod></url><url><loc>https://www.academycyber.com/burp-suite-ile-web-uygulama-guvenligi-testleri/</loc><lastmod>2025-07-04T13:47:02+03:00</lastmod></url><url><loc>https://www.academycyber.com/siber-guvenlik-sertifikasi-ile-gelecegi-sekillendirin/</loc><lastmod>2025-07-04T13:55:19+03:00</lastmod></url><url><loc>https://www.academycyber.com/online-siber-guvenlik-egitimi-ile-sifirdan-uzmanliga/</loc><lastmod>2025-07-04T13:47:45+03:00</lastmod></url><url><loc>https://www.academycyber.com/ips-ids-nedir-ag-guvenliginin-gorunmeyen-kahramanlari/</loc><lastmod>2025-07-04T13:42:06+03:00</lastmod></url><url><loc>https://www.academycyber.com/israil-ve-iran-catismasi-siber-savas-analizi/</loc><lastmod>2025-07-11T15:33:12+03:00</lastmod></url></urlset>
