<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://thesecuritynoob.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://thesecuritynoob.com/cybersecurity/the-first-post/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/a-hacker-a-ciso-and-a-policeman-event/</loc><lastmod>2019-09-19T07:47:24+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/networking-done-now-to-start-hacking/</loc><lastmod>2019-09-19T08:24:41+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/installing-kali-linux-on-virtualbox-and-the-beginning-of-my-lab/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/just-finished-the-complete-ethical-hacking-masterclass-beginner-to-expert-course-by-hackersploit/</loc><lastmod>2020-02-26T07:42:05+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/an-interview-with-darknet-diaries-tunnelsup-jack-rhysider/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/linux-basics-for-hackers-by-occupy-the-web-no-starch-press-review/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/an-interview-with-hacker-author-occupy-the-web/</loc><lastmod>2020-02-26T07:40:51+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/what-is-privilege-escalation-how-i-never-won-an-oscp-voucher/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/bash-bunny-from-hak5-is-awesome-fun/</loc><lastmod>2020-10-22T14:12:10+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-hacker-mike-jones-sting3r/</loc><lastmod>2020-10-22T14:12:09+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/security-certification-progression-chart/</loc><lastmod>2020-10-22T14:12:09+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/getting-started-becoming-a-cyber-warrior-by-occupy-the-web-review/</loc><lastmod>2020-10-22T14:12:08+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-founder-cto-of-hackersploit-hacking-trainer-and-professional-pentester-alexis-ahmed/</loc><lastmod>2020-10-22T14:12:07+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/the-complete-cyber-security-course-volume-1-by-nathan-house-review/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/about-parrot-os-and-interview-with-its-founder-lorenzo-palinuro-faletra/</loc><lastmod>2020-10-22T14:12:06+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/the-complete-cyber-security-course-volume-2-by-nathan-house-review/</loc><lastmod>2020-10-22T14:12:04+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-cybercrime-expert-and-osint-specialist-under-the-breach-youve-probably-seen-them-in-the-news/</loc><lastmod>2020-10-22T14:12:04+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/ctf-bandit-level-0-walkthrough/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/ctf-bandit-level-0-1-walkthrough/</loc><lastmod>2026-04-18T10:31:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/ctf-bandit-level-1-2-walkthrough/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/ctf-bandit-level-2-3-walkthrough/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-cybersecurity-expert-and-writer-daniel-miessler/</loc><lastmod>2020-10-22T14:12:01+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/the-complete-cyber-security-course-volume-3-by-nathan-house-review/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/powershell-for-hackers-w41-by-atul-tiwari-for-hakin9-review/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/interview-with-award-winning-security-blogger-researcher-podcaster-and-public-speaker-graham-cluley/</loc><lastmod>2020-10-22T14:11:59+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/the-complete-cyber-security-course-volume-4-end-point-protection-by-nathan-house-review/</loc><lastmod>2020-10-22T14:11:58+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/onslaught-breached-a-cybersecurity-comic-book/</loc><lastmod>2020-10-22T14:11:57+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-kayne-mcgladrey-vciso-spokesperson-global-cybersecurity-thought-leader-strategy-and-grc-practice-lead/</loc><lastmod>2020-10-26T17:40:04+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/introduction-to-malware-analysis-for-incident-responders-by-jason-dion-review/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/blue-team-boot-camp-defending-against-hackers-by-jonathan-elliott-for-codered-review/</loc><lastmod>2020-11-19T11:39:47+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/interview-with-heath-adams-the-cyber-mentor-youtuber-ceo-of-tcm-security-and-hacker/</loc><lastmod>2020-11-30T13:44:23+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/osint-fun-with-open-source-intelligence-by-pentester-academy-review/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/pentester-academy-special-rate-10-discount/</loc><lastmod>2021-05-19T14:37:14+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/the-art-of-exploitation-course-by-mohamed-atef-for-station-x-review/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/nominated-best-up-coming-blog-at-european-cybersecurity-blogger-awards/</loc><lastmod>2021-05-27T08:27:30+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/just-completed-cyber-defence-pathway-at-tryhackme/</loc><lastmod>2021-06-14T14:08:36+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/learn-to-hack-get-some-prizes-at-tryhackme-as-easy-as-that/</loc><lastmod>2026-04-18T10:31:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/interview-with-security-and-privacy-expert-mikko-hypponen/</loc><lastmod>2026-04-18T10:30:35+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/winner-the-security-noob-best-up-coming-cybersecurity-blog-2021-fact/</loc><lastmod>2021-07-20T15:29:30+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/crto-certified-red-team-operator-review-by-zero-point-security-review/</loc><lastmod>2026-04-18T10:30:35+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-alyssa-miller-biso-sp-global-ratings-hacker-researcher-security-advocate-authorspeaker-rsa-tedx-others-more/</loc><lastmod>2021-08-06T07:57:42+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/competition-time-cybersecurity-ethical-hacking-prizes-and-five-winners/</loc><lastmod>2021-08-31T13:22:25+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/cybersecurity-merchandise-looking-at-varonis/</loc><lastmod>2026-04-18T10:30:35+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-mental-health-hackers-ceo-amanda-berlin/</loc><lastmod>2021-09-16T10:57:38+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-senior-security-analyst-videogame-enthusiast-video-and-cat-mom-th3cyb3rk1tt3n/</loc><lastmod>2021-10-28T13:17:06+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/metasploit5-basics-for-hackers-by-occupy-the-web-review/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-head-cyber-jedi-of-pwndefend-daniel-card/</loc><lastmod>2021-11-16T16:24:38+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-ippsec-of-youtube-and-hackthebox/</loc><lastmod>2022-01-06T16:09:05+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/i-am-starting-ec-council-certified-incident-handler-v2-this-week/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-private-investigator-osint-specialist-opsec-wizard-surveillance-tscm-guru-ohshint/</loc><lastmod>2022-03-22T08:03:45+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-one-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-two-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2022-04-13T14:17:43+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-reformed-convicted-black-hat-hacker-daniel-kelley-of-the-big-talk-talk-hack-of-2015/</loc><lastmod>2022-04-19T13:48:30+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-three-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-teacher-ethical-hacker-compute-scientist-and-founder-ceo-of-zsecurity-zaid-sabih/</loc><lastmod>2022-05-09T10:17:53+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-four-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-five-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-six-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-seven-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-director-of-intelligence-for-ncptf-national-child-protection-task-force-and-osint-expert-griffin-hatless1der/</loc><lastmod>2022-07-12T13:17:21+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-eight-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-security-researcher-speaker-will-thomas-bushidotoken/</loc><lastmod>2022-07-18T14:16:40+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-nine-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-ten-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/week-eleven-of-ec-council-certified-incident-handler-ecih-version-2-self-study-training/</loc><lastmod>2026-04-18T10:30:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/hacking-apis-breaking-web-application-programming-interfaces-by-corey-j-ball-for-no-starch-press-review/</loc><lastmod>2022-08-12T09:52:47+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/turning-more-of-a-focus-onto-dfir-digital-forensics-incident-response-and-hacking-here-at-the-security-noob/</loc><lastmod>2026-04-18T10:30:33+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-dfir-diva-blogger-of-all-things-dfir-creator-of-get-your-start-in-dfir-and-dfir-analyst/</loc><lastmod>2022-09-02T12:09:45+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-timeline-explorer-what-is-it-how-to-use/</loc><lastmod>2022-09-06T15:41:54+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-13-cubed-who-is-also-dfir-investigator-for-microsoft-richard-davis/</loc><lastmod>2022-09-08T15:07:50+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-amcacheparser-what-is-it-how-to-use/</loc><lastmod>2022-09-12T12:12:17+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-krzysztof-chris-stanko-the-forensic-guy-a-mobile-computer-forensic-examiner-and-co-founder-of-data-rescue-labs-inc/</loc><lastmod>2022-09-27T07:12:50+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-amcacheparser-what-is-it-how-to-use-2/</loc><lastmod>2022-09-24T06:24:32+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-bstrings-what-is-it-how-to-use/</loc><lastmod>2022-09-29T16:03:23+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-dfir-legend-brett-shavers/</loc><lastmod>2022-10-03T15:52:46+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/python-for-kids-2nd-edition-by-jason-r-briggs-for-no-starch-press-review/</loc><lastmod>2022-11-10T12:38:44+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/learn-computer-forensics-second-edition-by-william-oettinger-for-packt-review/</loc><lastmod>2026-04-18T10:30:33+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/hacktoria-lost-at-sea-walkthrough/</loc><lastmod>2026-04-18T10:30:32+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/hacktoria-the-killer-clown-walkthrough/</loc><lastmod>2026-04-18T10:30:32+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-0-day-clothing/</loc><lastmod>2022-11-29T10:58:28+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cybersecurity/hacktoria-prisoner-of-war-walkthrough/</loc><lastmod>2026-04-18T10:30:31+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-dfir-legend-alexis-brignoni/</loc><lastmod>2022-12-16T09:24:33+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-evtxecmd-what-is-it-how-to-use/</loc><lastmod>2022-12-29T09:04:02+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/how-linux-works-3rd-edition-by-brian-ward-for-no-starch-press-review/</loc><lastmod>2023-01-05T13:25:00+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-one-of-the-great-dfir-talents-alessandro-di-carlo-samaritan_o/</loc><lastmod>2023-01-03T15:48:54+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/network-basics-for-hackers-by-occupy-the-web-review/</loc><lastmod>2023-01-13T14:51:05+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/cybersecurity-attacks-and-defenses-strategies-3rd-edition-by-yuri-diogenes-dr-erdal-ozkaya-review/</loc><lastmod>2023-01-19T10:18:33+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-hasher-what-is-it-how-to-use/</loc><lastmod>2023-01-22T11:17:38+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/practical-linux-forensics-a-guide-for-digital-investigators-by-bruce-nikkel-for-no-starch-press-review/</loc><lastmod>2023-02-03T08:12:36+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/cybersecurity-threats-malware-trends-strategies-by-tim-rains-2nd-edition-review/</loc><lastmod>2023-02-08T20:32:46+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/mastering-linux-security-and-hardening-safeguard-your-linux-systems-from-cyber-threats-3rd-edition-by-donald-a-tevault-review/</loc><lastmod>2023-10-08T21:01:20+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/cyber-tools/dfir-tools-jlecmd-what-is-it-how-to-use/</loc><lastmod>2023-10-09T08:59:11+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/interview-with-hacker-programmer-and-former-armoured-recon-patrol-commander-leigh-trinity/</loc><lastmod>2023-12-22T14:49:46+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/the-art-of-cyberwarfare-an-investigators-guide-to-espionage-ransomware-and-organized-cybercrime-by-jon-dimaggio-review/</loc><lastmod>2024-02-15T15:29:49+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/dead-simple-python-idiomatic-python-for-the-impatient-programmer-by-jason-c-mcdonald-review/</loc><lastmod>2024-02-15T15:49:46+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/black-hat-python-by-justin-seitz-and-tim-arnold-review/</loc><lastmod>2024-05-21T15:31:34+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/the-security-noob-interviews-kevin-pagano-of-stark4n6/</loc><lastmod>2024-06-03T08:53:25+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/the-ultimate-kali-linux-book-harness-nmap-metasploit-aircrack-ng-and-empire-for-cutting-edge-pentesting-third-edition-by-glen-d-singh-review/</loc><lastmod>2024-06-25T07:11:52+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/mastering-powershell-scripting-by-chris-dent-review/</loc><lastmod>2024-07-23T20:57:05+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/reviews/cryptography-algorithms-second-edition-by-massimo-bertaccini-review/</loc><lastmod>2024-08-20T19:33:08+00:00</lastmod></url><url><loc>https://thesecuritynoob.com/interviews/the-security-noob-interviews-amy-moles-the-ceo-co-founder-of-arcpoint-forensics/</loc><lastmod>2024-11-18T10:07:18+00:00</lastmod></url></urlset>
