<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.cyberengage.org/courses-1/google-workspace%2Fcloud-incident-response%2F-forensic</loc>
<lastmod>2026-03-04</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/dropzone-ai</loc>
<lastmod>2025-11-18</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/devops</loc>
<lastmod>2025-10-18</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/log-analysis-and-tracking-lateral-movement-in-using-event-ids</loc>
<lastmod>2026-03-04</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/sublime-security-edr-for-email</loc>
<lastmod>2025-10-31</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/carbon-black-edr</loc>
<lastmod>2025-08-06</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/petra-security</loc>
<lastmod>2025-08-06</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/network-forensic</loc>
<lastmod>2026-01-26</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/introducing%3A-browser-forensics-%E2%80%93-your-ultimate-guide-to-manual-analysis</loc>
<lastmod>2026-03-10</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/data-carving%3A-advanced-techniques-in-digital-forensics</loc>
<lastmod>2025-11-06</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/mastering-cloud-storage-forensics%3A-google-drive%2C-onedrive%2C-dropbox-%26-box-investigation-techniques</loc>
<lastmod>2026-02-02</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/mastering-velociraptor%3A-a-comprehensive-guide-to-incident-response-and-digital-forensics</loc>
<lastmod>2026-02-07</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/mastering-sentinelone%3A-a-comprehensive-guide-to-deep-visibility%2C-threat-hunting%2C-and-advanced-querying%22</loc>
<lastmod>2026-03-14</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/azure-incident-response</loc>
<lastmod>2024-12-03</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/mastering-memory-forensics%3A-in-depth-analysis-with-volatility-and-advanced-tools</loc>
<lastmod>2026-01-02</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/forensic%2Finvestigation-related-useful-blogs</loc>
<lastmod>2026-03-04</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/security-intelligence-cycle%3A-safeguarding-digital-fortresses</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/pass-the-hash-and-golden-ticket-attacks</loc>
<lastmod>2024-11-01</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/understanding-lateral-movement-in-cybersecurity</loc>
<lastmod>2025-10-18</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/incident-response-framework%3A-a-comprehensive-guide</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/wmi%3A-detection%2C-defense%2C-and-hunting</loc>
<lastmod>2024-11-01</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/kape-unleashed%3A-harnessing-power-in-incident-response</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/aws-forensics%3A-strategies-for-effective-incident-response</loc>
<lastmod>2024-11-01</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/cloud-based-investigations</loc>
<lastmod>2024-11-01</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/srum%3A-unveiling-insights-for-digital-investigations</loc>
<lastmod>2026-02-27</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/ntfs-journaling</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/insights-into-file-systems-and-anti-forensics</loc>
<lastmod>2025-02-18</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/decoding-timeline-analysis-in-digital-forensics</loc>
<lastmod>2025-02-16</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/mastering-windows-registry-forensics%3A</loc>
<lastmod>2026-04-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/linux-ir-forensics</loc>
<lastmod>2025-05-07</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/evolution-impact-of-ransomware</loc>
<lastmod>2025-02-21</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/windows-forensic-artifacts</loc>
<lastmod>2025-10-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/mac-forensics-capturing-analyzing-investigating-evidence</loc>
<lastmod>2025-04-18</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/usb-forensics</loc>
<lastmod>2026-04-13</lastmod>
</url>
<url>
<loc>https://www.cyberengage.org/courses-1/email-forensics</loc>
<lastmod>2025-03-01</lastmod>
</url>
</urlset>