<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gsec.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T22:25:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-1-gsec-at-a-glance-what-the-cert-proves</loc>
    <lastmod>2026-02-14T18:49:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-2-registration-exam-logistics-and-scoring</loc>
    <lastmod>2026-02-14T18:50:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-3-study-blueprint-and-resource-strategy</loc>
    <lastmod>2026-02-14T18:50:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-4-test-taking-tactics-and-time-management</loc>
    <lastmod>2026-02-14T18:50:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-5-building-your-personal-learning-plan</loc>
    <lastmod>2026-02-14T18:56:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-6-mindset-note-taking-and-memory-techniques</loc>
    <lastmod>2026-02-14T18:56:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-7-security-mindset-defense-in-depth</loc>
    <lastmod>2026-02-14T18:56:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-8-threats-vulnerabilities-and-exposure-basics</loc>
    <lastmod>2026-02-14T18:57:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-9-risk-likelihood-and-impact-in-practice</loc>
    <lastmod>2026-02-14T18:57:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-10-security-policies-purpose-scope-ownership</loc>
    <lastmod>2026-02-14T18:57:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-11-security-standards-baselines-and-procedures</loc>
    <lastmod>2026-02-14T18:57:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-12-security-awareness-human-risk-controls</loc>
    <lastmod>2026-02-14T18:58:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-13-networking-protocols-i-osi-and-tcp-ip</loc>
    <lastmod>2026-02-14T18:59:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-14-networking-protocols-ii-addressing-and-subnets</loc>
    <lastmod>2026-02-14T19:00:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-15-networking-protocols-iii-ports-services-bannering</loc>
    <lastmod>2026-02-14T19:00:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-16-network-segmentation-vlans-zones-and-trust</loc>
    <lastmod>2026-02-14T19:00:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-17-secure-routing-and-switching-fundamentals</loc>
    <lastmod>2026-02-14T19:00:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-18-dns-dhcp-nat-security-implications</loc>
    <lastmod>2026-02-14T19:01:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-19-network-monitoring-netflow-span-and-taps</loc>
    <lastmod>2026-02-14T19:01:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-20-wireless-basics-802-11-wpa2-3-and-eap</loc>
    <lastmod>2026-02-14T19:01:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-21-wireless-hardening-configs-rogue-aps-and-wids-wips</loc>
    <lastmod>2026-02-14T19:01:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-22-identity-access-management-i-authn-vs-authz</loc>
    <lastmod>2026-02-14T19:02:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-23-identity-access-management-ii-roles-and-least-privilege</loc>
    <lastmod>2026-02-14T19:02:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-24-password-policy-mfa-and-credential-hygiene</loc>
    <lastmod>2026-02-14T19:02:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-25-session-management-and-timeout-strategy</loc>
    <lastmod>2026-02-14T19:02:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-26-windows-fundamentals-filesystems-and-acls</loc>
    <lastmod>2026-02-14T19:02:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-27-windows-accounts-users-groups-and-privileges</loc>
    <lastmod>2026-02-14T19:03:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-28-windows-domain-basics-ad-structure-and-trusts</loc>
    <lastmod>2026-02-14T19:03:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-29-group-policy-security-settings-and-enforcement</loc>
    <lastmod>2026-02-14T19:03:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-30-windows-services-rdp-smb-iis-hardening</loc>
    <lastmod>2026-02-14T19:04:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-31-windows-patching-and-update-channels</loc>
    <lastmod>2026-02-14T19:04:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-32-windows-auditing-event-logs-and-policies</loc>
    <lastmod>2026-02-14T19:08:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-33-powershell-for-security-tasks</loc>
    <lastmod>2026-02-14T19:08:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-34-windows-investigation-common-artifacts</loc>
    <lastmod>2026-02-14T19:08:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-35-linux-fundamentals-files-users-and-groups</loc>
    <lastmod>2026-02-14T19:09:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-36-linux-permissions-ugo-suid-sgid-and-sticky-bits</loc>
    <lastmod>2026-02-14T19:09:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-37-linux-networking-interfaces-iptables-and-nftables</loc>
    <lastmod>2026-02-14T19:46:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-38-linux-services-and-daemons-systemd-control</loc>
    <lastmod>2026-02-14T19:47:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-39-linux-logging-syslog-journald-and-log-rotation</loc>
    <lastmod>2026-02-14T19:47:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-40-linux-hardening-ssh-pam-and-auditd</loc>
    <lastmod>2026-02-14T19:47:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-41-bash-for-security-automation</loc>
    <lastmod>2026-02-14T19:47:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-42-linux-incident-basics-triage-and-artifacts</loc>
    <lastmod>2026-02-14T19:48:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-43-endpoint-security-i-epp-hids-hips-firewalls</loc>
    <lastmod>2026-02-14T19:48:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-44-endpoint-security-ii-application-control-and-sandboxing</loc>
    <lastmod>2026-02-14T19:48:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-45-browser-and-email-client-hardening</loc>
    <lastmod>2026-02-14T19:48:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-46-mobile-device-security-mdm-byod-and-app-risks</loc>
    <lastmod>2026-02-14T19:49:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-47-macos-security-essentials-and-hardening</loc>
    <lastmod>2026-02-14T19:49:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-48-network-security-devices-i-firewalls-and-policy</loc>
    <lastmod>2026-02-14T19:49:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-49-network-security-devices-ii-ids-ips-and-placement</loc>
    <lastmod>2026-02-14T19:49:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-50-proxies-gateways-and-casb-basics</loc>
    <lastmod>2026-02-14T19:49:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-51-zero-trust-networking-principles-to-practice</loc>
    <lastmod>2026-02-14T19:50:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-52-logging-fundamentals-what-where-and-why</loc>
    <lastmod>2026-02-14T19:50:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-53-log-normalization-and-time-synchronization-ntp</loc>
    <lastmod>2026-02-14T19:51:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-54-siem-use-cases-alerts-detections-and-tuning</loc>
    <lastmod>2026-02-14T19:51:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-55-building-dashboards-and-triage-routines</loc>
    <lastmod>2026-02-14T19:51:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-56-retention-chain-of-custody-and-privacy-considerations</loc>
    <lastmod>2026-02-14T19:51:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-57-cryptography-i-core-concepts-and-threats</loc>
    <lastmod>2026-02-14T19:52:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-58-cryptography-ii-symmetric-asymmetric-and-hashing</loc>
    <lastmod>2026-02-14T19:52:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-59-pki-and-certificates-ca-crl-and-ocsp</loc>
    <lastmod>2026-02-14T19:52:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-60-tls-in-practice-ciphers-versions-and-configs</loc>
    <lastmod>2026-02-14T19:52:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-61-crypto-tools-vpns-ssh-gpg-and-disk-encryption</loc>
    <lastmod>2026-02-14T19:53:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-62-web-communication-security-i-https-cookies-and-sessions</loc>
    <lastmod>2026-02-14T19:53:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-63-web-communication-security-ii-headers-and-hsts</loc>
    <lastmod>2026-02-14T19:53:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-64-common-web-risks-injection-xss-and-csrf</loc>
    <lastmod>2026-02-14T19:53:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-65-api-security-fundamentals-keys-tokens-and-rate-limits</loc>
    <lastmod>2026-02-14T19:54:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-66-malware-i-types-vectors-and-evasion</loc>
    <lastmod>2026-02-14T19:54:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-67-malware-ii-prevention-detection-and-containment</loc>
    <lastmod>2026-02-14T19:54:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-68-ransomware-controls-backups-and-playbooks</loc>
    <lastmod>2026-02-14T19:54:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-69-phishing-and-social-engineering-countermeasures</loc>
    <lastmod>2026-02-14T19:55:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-70-vulnerability-management-i-asset-inventory-and-scoping</loc>
    <lastmod>2026-02-14T19:55:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-71-vulnerability-management-ii-scanners-false-positives-and-slas</loc>
    <lastmod>2026-02-14T19:55:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-72-pen-testing-basics-rules-methods-and-ethics</loc>
    <lastmod>2026-02-14T19:56:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-73-remediation-planning-and-verification-loops</loc>
    <lastmod>2026-02-14T19:56:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-74-backup-fundamentals-3-2-1-immutability-and-testing</loc>
    <lastmod>2026-02-14T19:56:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-75-business-continuity-and-disaster-recovery-basics</loc>
    <lastmod>2026-02-14T19:57:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-76-change-and-configuration-management-controls</loc>
    <lastmod>2026-02-14T19:57:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-77-secure-baselines-hardening-guides-and-benchmarks</loc>
    <lastmod>2026-02-14T19:57:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-78-cloud-security-i-shared-responsibility-model</loc>
    <lastmod>2026-02-14T19:57:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-79-cloud-security-ii-iam-network-and-storage-controls</loc>
    <lastmod>2026-02-14T19:58:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-80-cloud-security-iii-logging-keys-and-workload-hygiene</loc>
    <lastmod>2026-02-14T19:58:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-81-virtualization-and-container-security-basics</loc>
    <lastmod>2026-02-14T19:58:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-82-secrets-management-and-key-handling</loc>
    <lastmod>2026-02-14T19:58:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-83-data-classification-and-handling-requirements</loc>
    <lastmod>2026-02-14T19:59:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-84-data-loss-prevention-endpoints-network-and-cloud</loc>
    <lastmod>2026-02-14T19:59:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-85-email-security-spf-dkim-dmarc-and-gateways</loc>
    <lastmod>2026-02-14T19:59:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-86-secure-file-transfer-and-collaboration-patterns</loc>
    <lastmod>2026-02-14T19:59:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-87-supply-chain-and-third-party-risk</loc>
    <lastmod>2026-02-14T20:00:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-88-physical-security-and-environmental-controls</loc>
    <lastmod>2026-02-14T20:00:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-89-legal-privacy-and-ethics-for-practitioners</loc>
    <lastmod>2026-02-14T20:00:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/episode-90-metrics-and-reporting-turning-data-into-decisions</loc>
    <lastmod>2026-02-14T20:00:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsec.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-27T01:44:44Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
