<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/identity-theft</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/gnu-privacy-guard-(gpg)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jailbreaking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/watering-hole-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jamming-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/host-isolation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/user-enumeration-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fido-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/pgp-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/high-privilege-account-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vehicle-cybersecurity</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/version-control-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/obfuscation-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/mobile-spyware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/anomaly-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hacking-as-a-service-(haas)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/insecure-direct-object-references-(idor)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/url-manipulation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/google-dorking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fast-flux-dns</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/drive-by-download</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/null-byte-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/address-resolution-protocol-(arp)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/credential-harvesting</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zshell-scripting-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/offline-brute-force-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/one-time-password-(otp)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/volatility-memory-forensics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/web-cache-poisoning</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/typo-squatting</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/guest-network-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/binary-exploitation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/tamper-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/arbitrary-code-execution</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/windows-defender-security-features</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/time-based-one-time-password-(totp)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/common-vulnerabilities-and-exposures-(cve)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/quantum-key-distribution-(qkd)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jaccard-similarity-in-threat-intelligence</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kernel-sandboxing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/function-hooking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/event-correlation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/side-channel-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/reflection-ddos-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/wordpress-security-hardening</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yahoo-mail-phishing-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/encrypted-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/time-of-check-to-time-of-use-(toctou)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zoning-in-data-center-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/honeypot</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/federated-identity-management</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/sql-injection-(sqli)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vulnerability-exploitation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yahoo-account-takeover-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hardcoded-secrets</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/outdated-software-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/electromagnetic-eavesdropping</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x.509-certificates</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x.700-network-security-management</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/z-wave-iot-device-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/data-encryption-standard-(des)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/heuristic-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/quarantine-network</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/security-by-design</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/java-deserialization-vulnerabilities</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/two-factor-authentication-(2fa)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yielding-to-attack-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/secure-sockets-layer-(ssl)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/firmware-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/rebinding-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/whaling-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/elliptic-curve-cryptography-(ecc)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/packet-sniffing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/transparent-proxy</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/job-control-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zettabyte-scale-data-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/resilience-engineering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zero-day-malware-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/log-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/malvertising</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/heap-spray-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/command-and-control-(c2)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/network-anomaly-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fault-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/quantum-safe-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/backup-and-recovery</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/untrusted-code-execution</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/real-time-threat-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/visualcaptcha-bypass</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/code-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/openvpn-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/stack-smashing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/malware-persistence-mechanisms</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/rootkits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hidden-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/operating-system-hardening</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/full-disk-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/geofencing-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/replay-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/luks-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/spyware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/air-gapped-network</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xmpp-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/transmission-control-protocol-(tcp)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/grc-automation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/json-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/clickjacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/digital-forensics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/open-web-application-security-project-(owasp)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jitter-based-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bastion-host</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hashing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/supply-chain-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/internet-of-things-(iot)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unauthorized-access</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/trojan-horse</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/penetration-testing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/secure-shell-(ssh)-tunneling</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/load-balancer-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/just-in-time-(jit)-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/lightweight-cryptography</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vulnerable-binary-exploitation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cross-site-scripting-(xss)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jwt-token-spoofing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fraud-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/reputation-based-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/y2k38-bug-(unix-timestamp-issue)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/trapdoor-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yubicloud-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/transport-layer-security-(tls)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/traffic-analysis-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kubernetes-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/qr-code-phishing-(quishing)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unpatched-vulnerabilities</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/linux-security-modules-(lsm)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/software-bill-of-materials-(sbom)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/password-spraying</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/z-wave-security-vulnerabilities</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xor-obfuscation-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/known-plaintext-attack-(kpa)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/near-field-communication-(nfc)-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/device-fingerprinting</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ransomware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/privilege-escalation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/business-email-compromise-(bec)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/java-cryptographic-architecture-(jca)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/rogue-access-point</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/least-authority-model</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/web-application-firewall-(waf)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/oauth-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/http-security-headers</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nonce-based-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/message-authentication-code-(mac)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/forensic-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unstructured-data-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zipping-files-for-malware-concealment</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/whitelist-bypass</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/authorization</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xss-(cross-site-scripting)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/phishing-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unfiltered-input-vulnerabilities</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/k-anonymity</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/browser-fingerprinting</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/inter-process-communication-(ipc)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hardware-security-module-(hsm)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/memory-forensics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jump-server-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/insider-threat</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/tabletop-exercise-(ttx)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nids-(network-intrusion-detection-system)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/embedded-system-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/macro-virus</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cobalt-strike</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x86-assembly-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/javascript-keyloggers</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/behavior-based-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/visual-spoofing-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/infrastructure-as-code-(iac)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zoom-security-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vector-injection-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/payload-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/deep-packet-inspection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yaml-parsing-vulnerabilities</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zero-permission-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/format-string-vulnerabilities</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/dark-web-monitoring</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/data-tampering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/exfiltration-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/governance%2C-risk%2C-and-compliance-(grc)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/eavesdropping-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/local-file-inclusion-(lfi)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/beaconing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zeus-banking-trojan</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/protocol-spoofing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/over-the-air-(ota)-updates-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fileless-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/powershell-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nfc-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/secure-coding-practices</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/website-defacement</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/your-phone-hacking-risks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xdr-(extended-detection-and-response)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/youtube-account-hijacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ubuntu-security-hardening</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/garbled-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xsrf-(cross-site-request-forgery)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/intrusion-detection-system-(ids)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cyber-threat-intelligence-(cti)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/persistence-mechanisms</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/java-security-manager</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/lookup-table-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/uniform-resource-locator-(url)-spoofing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/patch-management</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/just-in-time-access-control</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/host-based-intrusion-detection-system-(hids)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/advanced-persistent-threat-(apt)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/virtual-private-network-(vpn)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/data-exfiltration</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/registry-tampering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/application-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nation-state-threat-actors</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/attack-vector</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/knowledge-based-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/dynamic-malware-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/microservices-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/memory-corruption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zone-transfer-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yandex-browser-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/in-memory-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yellow-team-(cybersecurity-analysts)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kaspersky-security-network</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/proxy-bypass-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/gsm-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/generative-adversarial-networks-(gans)-in-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/machine-learning-in-cybersecurity</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bluetooth-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/json-web-token-(jwt)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/virus-total</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/qubit-based-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/optical-data-exfiltration</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/denial-of-service-(dos)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/least-privilege-principle</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/radio-frequency-identification-(rfid)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/live-forensics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/non-repudiation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/quantum-cryptography</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/gpg-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/reverse-engineering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vmescape-exploit</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/n-day-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cloud-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xslt-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/digital-signature</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/malicious-code-obfuscation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cryptography</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/identity-and-access-management-(iam)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/man-in-the-middle-attack-(mitm)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yahoo-data-breach-case-study</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/initialization-vector-(iv)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/offensive-security-testing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/managed-security-services-(mss)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/keyed-hashing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/javascript-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/asymmetric-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zero-knowledge-proofs</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xss-filter-evasion</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/session-hijacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/physical-security-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/container-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/remote-code-execution-(rce)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jamming-resistant-networks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bug-bounty</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/homomorphic-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/quick-response-security-patching</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/verification-code-hijacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x11-protocol-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/government-surveillance</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/passive-reconnaissance</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/keylogger</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/keystroke-dynamics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cyber-kill-chain</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/wireless-sniffing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/grandmaster-key-exploit</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/dwell-time</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/websocket-security-risks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/insecure-deserialization</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/buffer-overflow</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/human-factor-in-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/operational-security-(opsec)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zero-trust-architecture</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yanking-tokens-from-memory</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hypervisor-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jtag-debugging-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/key-reinstallation-attack-(krack)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/injection-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/lua-malware-scripts</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/wireless-jamming</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cyber-deception</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x.400-messaging-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/defense-in-depth</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/adversary-simulation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/access-control</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/certificate-authority-(ca)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/virtualization-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/lateral-movement</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/multi-factor-authentication-(mfa)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xml-external-entity-(xxe)-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/logic-bomb</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kernel-rootkits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/virtual-trusted-platform-module-(vtpm)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/sandbox-evasion</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x.25-network-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yubihsm-(hardware-security-module)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/malware-as-a-service-(maas)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zombie-botnets</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vulnerability-assessment</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/attack-surface</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/escalation-of-privileges</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/windows-registry-forensics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yammer-security-risks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unsecured-apis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/key-management-system-(kms)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/network-segmentation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zero-day-exploit</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/active-directory-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/incident-response</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/indicator-of-compromise-(ioc)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/out-of-band-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kernel-mode-code-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/open-source-intelligence-(osint)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/directory-traversal</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/memory-dump-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/brute-force-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nmap-scanning</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/covert-channel</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xml-security-standards</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bios-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/public-key-infrastructure-(pki)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ret2libc-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/threat-hunting</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/user-access-management</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/upstream-supply-chain-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/usb-based-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/forward-secrecy</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nist-cybersecurity-framework</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/threat-intelligence</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/your-phone-as-an-attack-vector</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/gray-hat-hacker</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/runtime-application-self-protection-(rasp)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zombie-processes-in-cybersecurity</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/overlay-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vendor-risk-management</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/social-engineering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/graph-based-threat-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/voice-recognition-spoofing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/link-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/flash-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/log-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yandex-cloud-security-measures</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vulnerability-disclosure-programs</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/exploit-development</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/wi-fi-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fake-wap-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/printer-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vishing-(voice-phishing)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/data-breach</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/layered-security-architecture</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/secure-boot</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/telemetry-data-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/security-token</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/process-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/threat-modeling</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/tunneling-protocols</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hijacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/exploit-kit</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/polymorphic-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/user-and-entity-behavior-analytics-(ueba)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kerberos-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/trusted-platform-module-(tpm)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/security-operations-center-(soc)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/quota-based-access-control</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/windows-event-log-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/key-exchange-algorithms</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/audit-trail</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/risk-based-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/key-wrapping</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fingerprinting-techniques</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/log-correlation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x509-key-extraction</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/data-loss-prevention-(dlp)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/out-of-bounds-write-exploit</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/network-access-control-(nac)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/enumeration</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/smishing-(sms-phishing)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/discretionary-access-control-(dac)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/steganography</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yaml-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/port-knocking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/java-sandbox-bypass</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/log4shell-vulnerability</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/x.500-directory-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/global-threat-intelligence</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fuzzing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cybersecurity-framework</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/anonymization</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/email-spoofing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hmac-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/framework-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/exploit-chaining</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kernel-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/blockchain-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/endpoint-protection-platform-(epp)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/on-device-ai-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zone-based-firewall</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/group-policy-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yagi-antenna-hacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/onion-routing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/decoy-networks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/dns-spoofing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/key-distribution-center-(kdc)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/frequency-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/undetectable-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/mimikatz</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/open-redirect-vulnerability</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ghost-phishing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bgp-hijacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/anti-virus</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/mobile-device-management-(mdm)-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/credential-stuffing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/red-teaming</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/cold-boot-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/intelligence-gathering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/firewall</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/lockbit-ransomware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/nat-slipstreaming</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/antivirus-evasion</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/kill-chain-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/rogue-software</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xor-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/worms</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/domain-hijacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/critical-infrastructure-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/endpoint-detection-and-response-(edr)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/tailgating-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/security-information-and-event-management-(siem)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/null-session-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/incident-handling</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/enhanced-security-configuration</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/integrity-monitoring</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/universal-second-factor-(u2f)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/token-based-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/gpu-based-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yubikey-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/malware-analysis</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/gateway-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/network-isolation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/log-tampering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zlib-compression-bomb-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/user-awareness-training</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unauthenticated-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zigbee-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/web-shells</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/asset-management</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/key-escrow</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bank-trojan</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/url-redirection-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/shadow-it</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/information-warfare</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hybrid-encryption</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/webrtc-security-issues</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xen-hypervisor-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/macros-in-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/network-security-policy-enforcement</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/compliance-monitoring</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/bootloader-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/error-based-sql-injection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/black-hat-hacker</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/password-cracking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ntlm-hash-cracking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/burp-suite</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/vpn-split-tunneling-risks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/yara-rules-for-malware-detection</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ram-scraping-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/online-social-engineering</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/query-based-authentication</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/weak-password-exploits</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hsts-bypass</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/metasploit-framework</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ground-truthing</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/network-traffic-analysis-(nta)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/enterprise-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/wireless-intrusion-prevention-system-(wips)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/botnet</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/white-box-cryptography</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/rainbow-table-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/blue-team</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/unlinkability-in-privacy</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/hexadecimal-obfuscation</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/query-injection-attacks</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/automated-threat-intelligence</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/ethical-hacking</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/intent-based-networking-security</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/fragmentation-attack</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/xcodeghost-malware</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/information-disclosure-vulnerability</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/zigzag-cipher-in-cryptography</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/next-generation-firewall-(ngfw)</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://learn.deepcytes.io/copy-of-glossary-keywords-descripti/jump-host-compromise</loc>
<lastmod>2025-02-18</lastmod>
</url>
</urlset>