<?xml version="1.0" encoding="UTF-8"?>
   <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/4db8a44e-c29b-4e1f-9d4a-682d28a62fe8pythonbasics</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/8078562c-7e86-44eb-80c8-eef270cafc7ecommonalgorithms</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/81dd4b80-d563-424d-b29c-e4612d628d021ddatastructures</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/e7f4130e-4ffa-40aa-9150-7bc87ec7de2etreesandgraphs</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/50d907c8-15fa-44c0-bc63-0c5e4e80045aadvancedalgorithmsandcapstonewrapup</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/onboardingandfaqs-b61a1</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/faqs-78ac5</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/introtocybersecurity-bf853</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/computersystemsfundamentals-c9c39</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/networkingfundamentals-c00c6</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/securityfundamentals-59e35</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/applicationsecurity-52355</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/infrastructuresecurity-7faf1</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/detectionengineering-443d4</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/digitalforensics-db9a0</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/penetrationtesting-e9f71</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/basicsofctfsconferencesbugbountynetworking-d8e78</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/exercisescenariobasedquiz-4f91b</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/siemsetup-86369</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/howllmsactuallyworknotthehypeversion-fb728</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/aithreatlandscape-6a0bc</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/keymlconceptseverysecurityengineerneedstoknow-a3987</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/aimlmetricstocareabout-88f45</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/whylocalmodelsmatterforsecurity-ce8f0</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/runningopensourcellmslocally-97cda</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/finetuningamodelonsecurityspecificdata-e1d2e</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/evaluatingmodelquality-cda2c</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/mlopsforsecurityworkflows-eeb17</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/promptengineeringtechniquesthatactuallywork-dcdaa</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/buildingaragoveryourowndata-93768</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/structuringknowledgebasesforsecurityusecases-9f052</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/modelcontextprotocolsmcpsforreliableaibehavior-fc5e9</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/preventingpromptinjectionattacks-bccb2</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/whatagentsareandwhentousethemvssimplellmcalls-4bdf7</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/buildingamultistepsecurityautomationagent-a1a9d</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/tooluseandfunctioncalling-66dce</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/chainingagentsforcomplexworkflows-dad32</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/failuremodestowatchforinproductionagents-ba16e</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/applicationsinapplicationsecurity-eacb9</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/applicationininfrastructuresecurity-cc627</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/applicationsindetectionengineering-fe38b</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/applicationsinpentesting-afb69</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/applicationsindigitalforensicsandincidentresponse-95ab3</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/livedemosofselectedstudentscapstoneaisecuritytools-943b8</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/leaderboardandwinnersannoucement-9716a</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/instructorfeedbackonprojects-a7b62</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/partingthoughts-6ca21</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/lesson/livelectureonbuildingaiagents-680ba</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/gardetthibault29593/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/colinang8876562/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/janardhan0511/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/vishnuvamsibezawada89114/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/iastrovskaya37078/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/mkabautista/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/dongtrunghuynh/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/bimohan/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/koalapplegg/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/Winbalf/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/chundrumanishankar30837/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/summ3r/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/purvansh95b46834/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/manishmulchandani060996071/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/ocbella/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/samuel18041/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/subhsam25/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/rabarrios2529676/coding-bootcamp-for-cybersecurity-professionals-50bb90</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/michael-vogroup/cybersecurity-bootcamp-639e55</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/achakra7/cybersecurity-bootcamp-639e55</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/jaelenaps_34410/cybersecurity-bootcamp-639e55</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/unknowndehlawi/cybersecurity-bootcamp-639e55</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/certification/sanghviraaj5/cybersecurity-bootcamp-639e55</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/lightning-lessons-5217</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/30-day-cybersecurity-challenge-5873</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/test-program-9911</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/cybersecurity-bootcamp-4654</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/cybersecurity-coding-boot-camp-7510</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/all-access-subscription-9108</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/program/ai-for-cybersecurity-8503</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/about</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/search</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/reviews</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/contact</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/signup</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
       <url>
           <loc>https://learn.thecyberinstructor.com/login</loc>
           <lastmod>2025-12-18</lastmod>
       </url>
     
   </urlset>
 