<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T21:09:43Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/cloudnetx-prepcast-trailer-learn-how-the-exam-thinks-not-just-what-it-asks</loc>
    <lastmod>2026-01-16T18:42:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-1-how-cloudnetx-questions-work-scenario-clues-constraints-and-best-answer-logic</loc>
    <lastmod>2026-01-16T18:43:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-2-your-hybrid-network-mental-model-zones-flows-and-control-points</loc>
    <lastmod>2026-01-16T18:44:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-3-the-four-exam-priorities-security-availability-performance-and-cost-tradeoffs</loc>
    <lastmod>2026-01-16T18:45:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-4-reading-requirements-like-an-architect-what-the-question-is-really-asking</loc>
    <lastmod>2026-01-16T18:45:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-5-fast-recall-system-turning-objectives-into-mental-checklists</loc>
    <lastmod>2026-01-16T18:46:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-6-final-prep-strategy-how-to-review-and-self-test-using-audio-only</loc>
    <lastmod>2026-01-16T18:46:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-7-osi-as-a-design-tool-translating-requirements-into-network-decisions</loc>
    <lastmod>2026-01-16T18:47:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-8-ipv4-addressing-strategy-public-private-static-dynamic-and-design-implications</loc>
    <lastmod>2026-01-16T18:56:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-9-subnetting-for-architects-cidr-vlsm-and-right-sizing-networks</loc>
    <lastmod>2026-01-16T18:57:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-10-ipv6-strategy-in-hybrid-adoption-patterns-common-pitfalls-and-exam-cues</loc>
    <lastmod>2026-01-16T18:57:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-11-tcp-vs-udp-decisions-reliability-latency-and-application-fit</loc>
    <lastmod>2026-01-16T19:03:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-12-nat-patterns-port-forwarding-vs-pat-and-what-each-solves</loc>
    <lastmod>2026-01-16T19:03:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-13-nat64-and-ipv6-interop-when-it-appears-and-what-breaks</loc>
    <lastmod>2026-01-16T19:04:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-14-dhcp-by-design-scope-sizing-resilience-and-failure-signals</loc>
    <lastmod>2026-01-16T19:04:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-15-ntp-by-design-time-dependencies-auth-impact-and-incident-clues</loc>
    <lastmod>2026-01-16T19:04:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-16-dns-resolution-flow-dependencies-recursion-and-where-failures-hide</loc>
    <lastmod>2026-01-16T19:05:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-17-secure-dns-dnssec-vs-dot-vs-doh-and-what-each-protects</loc>
    <lastmod>2026-01-16T19:05:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-18-authentication-protocols-802-1x-radius-tacacs-ldap-in-scenarios</loc>
    <lastmod>2026-01-16T19:06:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-19-static-routing-simplicity-benefits-and-operational-risks</loc>
    <lastmod>2026-01-16T19:06:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-20-dynamic-routing-overview-what-changes-when-routes-must-adapt</loc>
    <lastmod>2026-01-16T19:06:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-21-ospf-vs-bgp-which-problem-each-one-is-solving</loc>
    <lastmod>2026-01-16T19:07:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-22-bgp-design-thinking-peering-intent-policy-and-stability</loc>
    <lastmod>2026-01-16T19:07:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-23-container-networking-basics-why-workloads-change-network-assumptions</loc>
    <lastmod>2026-01-16T19:08:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-24-network-virtual-interfaces-what-vnics-imply-for-control-and-visibility</loc>
    <lastmod>2026-01-16T19:08:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-25-picking-a-topology-star-mesh-hub-and-spoke-point-to-point</loc>
    <lastmod>2026-01-16T19:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-26-spine-and-leaf-what-it-optimizes-and-when-it-s-justified</loc>
    <lastmod>2026-01-16T19:09:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-27-network-zones-trusted-untrusted-and-screened-subnet-decisions</loc>
    <lastmod>2026-01-16T19:09:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-28-traffic-flows-designing-for-north-south-versus-east-west</loc>
    <lastmod>2026-01-16T19:13:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-29-segmentation-fundamentals-why-segmentation-fails-and-how-to-make-it-stick</loc>
    <lastmod>2026-01-16T19:14:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-30-vlan-segmentation-what-it-solves-and-common-design-traps</loc>
    <lastmod>2026-01-16T19:14:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-31-vxlan-what-overlays-enable-and-why-architects-use-them</loc>
    <lastmod>2026-01-16T19:15:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-32-geneve-where-encapsulation-shows-up-and-what-it-implies</loc>
    <lastmod>2026-01-16T19:15:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-33-production-vs-non-production-separation-blast-radius-and-governance</loc>
    <lastmod>2026-01-16T19:16:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-34-wan-selection-framework-mpls-sd-wan-dia-metro-dark-fiber</loc>
    <lastmod>2026-01-16T19:16:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-35-cellular-links-when-constraints-make-cellular-the-best-answer</loc>
    <lastmod>2026-01-16T19:17:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-36-satellite-links-latency-reality-and-use-cases-that-fit</loc>
    <lastmod>2026-01-16T19:17:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-37-cloud-interconnects-direct-connect-expressroute-sdci-selection-logic</loc>
    <lastmod>2026-01-16T19:17:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-38-vpn-types-site-to-site-vs-point-to-site-vs-remote-access</loc>
    <lastmod>2026-01-16T19:18:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-39-split-tunneling-security-and-performance-tradeoffs-in-plain-language</loc>
    <lastmod>2026-01-16T19:18:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-40-wireguard-in-hybrid-why-it-s-referenced-and-when-it-fits</loc>
    <lastmod>2026-01-16T19:19:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-41-bastion-hosts-safe-admin-access-paths-in-hybrid-designs</loc>
    <lastmod>2026-01-16T19:19:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-42-ssh-vs-rdp-secure-management-assumptions-the-exam-tests</loc>
    <lastmod>2026-01-16T19:19:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-43-application-gateways-what-they-do-beyond-routing-and-firewalling</loc>
    <lastmod>2026-01-16T19:20:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-44-service-endpoints-private-access-patterns-for-managed-services</loc>
    <lastmod>2026-01-16T19:20:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-45-transit-gateways-hub-routing-without-spaghetti-networks</loc>
    <lastmod>2026-01-16T19:21:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-46-vpc-peering-vs-private-link-choosing-the-right-private-connectivity-model</loc>
    <lastmod>2026-01-16T19:21:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-47-availability-requirements-turning-uptime-promises-into-architecture</loc>
    <lastmod>2026-01-16T19:21:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-48-load-balancing-basics-global-vs-local-and-what-vip-means</loc>
    <lastmod>2026-01-16T19:22:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-49-load-balancing-methods-round-robin-least-connections-weighted-load-based</loc>
    <lastmod>2026-01-16T19:22:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-50-high-availability-patterns-active-active-vs-active-passive-tradeoffs</loc>
    <lastmod>2026-01-16T19:22:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-51-link-aggregation-capacity-redundancy-and-failure-behavior</loc>
    <lastmod>2026-01-16T19:23:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-52-autoscaling-availability-cost-control-and-risk-of-runaway-scaling</loc>
    <lastmod>2026-01-16T19:23:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-53-regions-and-availability-zones-designing-around-failure-domains</loc>
    <lastmod>2026-01-16T19:24:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-54-cdn-decisions-performance-resilience-and-correct-placement</loc>
    <lastmod>2026-01-16T19:24:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-55-fault-domains-and-update-domains-planning-for-planned-failure-events</loc>
    <lastmod>2026-01-16T19:25:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-56-redundancy-strategy-devices-paths-and-eliminating-single-points-of-failure</loc>
    <lastmod>2026-01-16T19:25:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-57-power-planning-voltage-wattage-amperage-pdus-ups-essentials</loc>
    <lastmod>2026-01-16T19:26:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-58-power-events-blackout-brownout-surge-spike-and-protective-choices</loc>
    <lastmod>2026-01-16T19:26:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-59-environmental-requirements-temperature-humidity-btus-and-failure-prevention</loc>
    <lastmod>2026-01-16T19:26:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-60-fire-suppression-awareness-what-network-architects-must-account-for</loc>
    <lastmod>2026-01-16T19:27:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-61-physical-security-controls-surveillance-biometrics-proximity-nfc-door-sensors</loc>
    <lastmod>2026-01-16T19:28:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-62-switching-vs-routing-layer-2-vs-layer-3-decision-patterns</loc>
    <lastmod>2026-01-16T19:28:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-63-poe-design-budgeting-power-and-avoiding-late-stage-surprises</loc>
    <lastmod>2026-01-16T19:37:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-64-three-tier-vs-collapsed-core-selecting-the-right-hierarchy</loc>
    <lastmod>2026-01-16T19:38:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-65-mdf-idf-design-maintainability-cable-strategy-and-operational-reality</loc>
    <lastmod>2026-01-16T19:39:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-66-stp-essentials-why-loops-happen-and-how-designs-prevent-them</loc>
    <lastmod>2026-01-16T19:40:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-67-trunking-and-tagging-how-vlans-move-across-the-network</loc>
    <lastmod>2026-01-16T19:40:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-68-bonding-when-to-bundle-links-and-what-can-go-wrong</loc>
    <lastmod>2026-01-16T19:41:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-69-voice-video-signals-sip-webrtc-rtsp-h-323-as-scenario-hints</loc>
    <lastmod>2026-01-16T19:46:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-70-cpe-and-media-converters-edge-realities-that-break-perfect-diagrams</loc>
    <lastmod>2026-01-16T19:47:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-71-wireless-architecture-aps-vs-controllers-and-division-of-responsibility</loc>
    <lastmod>2026-01-16T19:47:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-72-antennas-and-placement-coverage-assumptions-and-practical-constraints</loc>
    <lastmod>2026-01-16T19:47:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-73-bands-and-channels-2-4-5-6-ghz-tradeoffs-and-overlap-problems</loc>
    <lastmod>2026-01-16T19:48:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-74-ssid-strategy-hidden-vs-advertised-and-what-it-affects</loc>
    <lastmod>2026-01-16T19:48:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-75-roaming-behavior-sticky-clients-disassociation-and-user-impact</loc>
    <lastmod>2026-01-16T19:49:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-76-non-wi-fi-options-ble-nfc-lorawan-and-where-they-fit</loc>
    <lastmod>2026-01-16T19:49:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-77-requirements-analysis-business-technical-compliance-and-sow-inputs</loc>
    <lastmod>2026-01-16T19:50:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-78-network-diagrams-physical-vs-logical-and-high-level-vs-low-level</loc>
    <lastmod>2026-01-16T19:50:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-79-flow-diagrams-narrating-traffic-paths-for-security-and-ops</loc>
    <lastmod>2026-01-16T19:51:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-80-verification-and-validation-proving-the-design-meets-requirements</loc>
    <lastmod>2026-01-16T19:51:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-81-runbooks-turning-architecture-into-repeatable-operations</loc>
    <lastmod>2026-01-16T19:52:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-82-wbs-and-kb-articles-project-structure-and-maintainable-knowledge</loc>
    <lastmod>2026-01-16T19:52:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-83-baselines-what-to-measure-when-and-why-it-matters</loc>
    <lastmod>2026-01-16T19:53:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-84-reference-architectures-internal-vs-external-and-how-to-use-them</loc>
    <lastmod>2026-01-16T19:53:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-85-cmdb-thinking-asset-truth-ownership-and-operational-decision-support</loc>
    <lastmod>2026-01-16T19:54:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-86-threat-modeling-for-hybrid-networks-how-the-exam-frames-risk</loc>
    <lastmod>2026-01-16T19:54:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-87-ddos-and-syn-floods-recognition-patterns-and-mitigations</loc>
    <lastmod>2026-01-16T19:55:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-88-data-exfiltration-paths-choke-points-and-practical-controls</loc>
    <lastmod>2026-01-16T19:55:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-89-on-path-attacks-what-gets-exposed-and-how-to-reduce-it</loc>
    <lastmod>2026-01-16T19:56:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-90-out-of-band-attacks-when-separate-channel-becomes-the-threat</loc>
    <lastmod>2026-01-16T19:56:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-91-credential-attacks-reuse-brute-force-and-layered-defenses</loc>
    <lastmod>2026-01-16T19:57:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-92-social-engineering-why-network-controls-still-matter-afterward</loc>
    <lastmod>2026-01-16T19:57:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-93-evil-twin-and-rogue-aps-detection-mindset-and-prevention-controls</loc>
    <lastmod>2026-01-16T19:58:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-94-bgp-hijacking-what-it-is-and-what-mitigations-look-like</loc>
    <lastmod>2026-01-16T19:58:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-95-vulnerability-patterns-misconfig-legacy-acls-insecure-protocols-patch-gaps</loc>
    <lastmod>2026-01-16T19:59:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-96-mitigation-toolkit-dlp-ipam-cis-benchmarks-config-reviews-null-routing</loc>
    <lastmod>2026-01-16T19:59:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-97-framework-fluency-mitre-att-ck-cyber-kill-chain-ccm-in-exam-language</loc>
    <lastmod>2026-01-16T19:59:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-98-firewall-types-ngfw-vs-cloud-native-firewall-vs-waf</loc>
    <lastmod>2026-01-16T20:00:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-99-ids-vs-ips-detection-versus-prevention-and-tuning-tradeoffs</loc>
    <lastmod>2026-01-16T20:00:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-100-encryption-basics-symmetric-vs-asymmetric-and-scenario-expectations</loc>
    <lastmod>2026-01-16T20:01:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-101-tls-inspection-what-it-reveals-what-it-breaks-performance-impact</loc>
    <lastmod>2026-01-16T20:01:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-102-secure-web-gateway-vs-application-gateway-choosing-the-right-control-point</loc>
    <lastmod>2026-01-16T20:01:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-103-nac-concepts-posture-assessment-enforcement-points-dynamic-lists</loc>
    <lastmod>2026-01-16T20:02:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-104-firewall-rule-design-src-dst-allowlists-blocklists-app-aware-logic</loc>
    <lastmod>2026-01-16T20:02:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-105-decryption-rules-when-inspection-is-required-and-common-pitfalls</loc>
    <lastmod>2026-01-16T20:03:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-106-nacl-vs-nsg-stateless-stateful-thinking-and-inbound-outbound-logic</loc>
    <lastmod>2026-01-16T20:03:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-107-ids-ips-signatures-what-to-automate-and-what-to-constrain</loc>
    <lastmod>2026-01-16T20:06:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-108-geolocation-rules-when-geo-blocking-helps-and-when-it-backfires</loc>
    <lastmod>2026-01-16T20:06:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-109-url-and-content-filtering-categories-apps-file-blocking-tradeoffs</loc>
    <lastmod>2026-01-16T20:07:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-110-dlp-controls-preventing-leakage-without-stopping-business</loc>
    <lastmod>2026-01-16T20:07:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-111-port-security-limiting-lateral-movement-at-the-edge</loc>
    <lastmod>2026-01-16T20:08:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-112-zero-trust-fundamentals-identity-as-perimeter-and-continuous-verification</loc>
    <lastmod>2026-01-16T20:08:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-113-microsegmentation-limiting-east-west-movement-without-chaos</loc>
    <lastmod>2026-01-16T20:09:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-114-ztna-replacing-broad-trust-with-precise-access-decisions</loc>
    <lastmod>2026-01-16T20:09:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-115-sase-and-sse-tying-controls-to-users-devices-and-apps</loc>
    <lastmod>2026-01-16T20:10:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-116-casb-visibility-and-control-for-cloud-usage-and-data-flows</loc>
    <lastmod>2026-01-16T20:10:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-117-federation-and-sso-saml-vs-oauth-2-0-vs-oidc-clearly-explained</loc>
    <lastmod>2026-01-16T20:10:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-118-mfa-and-passwordless-what-each-solves-and-when-it-s-required</loc>
    <lastmod>2026-01-16T20:11:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-119-conditional-access-and-geofencing-policy-decisions-that-reduce-credential-risk</loc>
    <lastmod>2026-01-16T20:11:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cloudnetx.baremetalcyber.com/episodes/episode-120-iam-deep-dive-pam-rbac-abac-pki-kms-scim-ciem-in-network-scenarios</loc>
    <lastmod>2026-01-16T20:12:15Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
