<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://atmecyberarmor.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-1-1-introduction-to-cybersecurity-with-ai-interactive-dashboard/</loc><lastmod>2026-04-08T10:26:21+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-3-1-real-life-examples-of-cyber-threats/</loc><lastmod>2026-03-23T13:32:24+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-4-1-role-of-cybersecurity-in-personal-and-organizational-data-protection/</loc><lastmod>2026-03-23T13:32:40+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-9-1-material/</loc><lastmod>2026-03-23T13:35:45+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-1-1-introduction/</loc><lastmod>2026-03-20T16:26:24+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-1-2-cyber-security-professionals/</loc><lastmod>2026-03-20T16:32:48+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-2-1-introduction/</loc><lastmod>2026-03-20T16:36:38+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-2-2-patriot-hacking/</loc><lastmod>2026-03-20T16:37:41+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-3-1-introduction/</loc><lastmod>2026-03-20T16:40:34+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-3-2-social-engineering/</loc><lastmod>2026-03-20T16:41:50+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/2-3-3-cyber-stalking/</loc><lastmod>2026-03-20T16:42:53+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-1-introduction/</loc><lastmod>2026-03-11T14:18:20+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-3-1-step-by-step-exercise-instructions/</loc><lastmod>2026-03-18T15:08:33+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-3-2-video-tutorial/</loc><lastmod>2026-03-18T15:06:54+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-detecting-and-evaluating-ip-address-vulnerabilities/lessons/5-3-1-vulnerability-assessment-via-wireshark/</loc><lastmod>2026-03-18T13:37:47+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-detecting-and-evaluating-ip-address-vulnerabilities/lessons/5-2-1-installation-of-wireshark/</loc><lastmod>2026-03-18T13:37:26+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-detecting-and-evaluating-ip-address-vulnerabilities/lessons/5-4-1-vulnerability-assessment-using-n-map/</loc><lastmod>2026-03-18T13:39:19+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-2-types-of-cyber-attacks/</loc><lastmod>2026-03-10T14:02:58+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-3-tools-for-cyber-attack/</loc><lastmod>2026-03-10T14:03:21+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-4-protection-methods-for-cyber-attacks/</loc><lastmod>2026-03-10T14:04:44+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-5-certification-courses/</loc><lastmod>2025-03-12T10:29:23+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-6-job-prospect-and-course-sites/</loc><lastmod>2025-03-12T10:32:23+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-7-job-prospects-in-india/</loc><lastmod>2026-03-10T14:05:52+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-8-video-tutorial/</loc><lastmod>2025-03-12T10:34:31+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-1-1-training-platforms/</loc><lastmod>2026-03-14T15:49:32+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-2-1-cybersecurity-labslinks-interactive-dashboard/</loc><lastmod>2026-03-14T16:05:00+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-3-1-youtube-video-links/</loc><lastmod>2026-03-14T15:51:42+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-4-1-cybersecurity-hacking-documentaries/</loc><lastmod>2026-03-14T16:49:59+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-4-1-simulating-a-password-attack-tutorial/</loc><lastmod>2026-03-18T15:07:09+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/new-course__trashed/lessons/sample/</loc><lastmod>2024-12-05T14:35:16+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-3-1-social-engineering-attacks/</loc><lastmod>2026-03-18T16:11:50+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-8-encryption-and-decryption/lessons/8-1-1-encryption-and-decryption-overview/</loc><lastmod>2026-03-20T16:08:07+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-8-encryption-and-decryption/lessons/8-1-2-step-by-step-exercise-for-encryption-and-decryption/</loc><lastmod>2025-03-18T20:40:13+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-8-encryption-and-decryption/lessons/8-2-1-step-by-step-self-study-exercise/</loc><lastmod>2025-03-18T20:40:54+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-9-wi-fi-hacking-with-evil-twin-attack/lessons/9-1-1-overview/</loc><lastmod>2026-04-08T13:58:19+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-9-wi-fi-hacking-with-evil-twin-attack/lessons/9-1-2-step-by-step-exercise-using-esp8266/</loc><lastmod>2026-04-08T12:15:05+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-9-wi-fi-hacking-with-evil-twin-attack/lessons/9-2-1-step-by-step-guide/</loc><lastmod>2026-04-08T14:05:39+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-9-wi-fi-hacking-with-evil-twin-attack/lessons/9-3-1-step-by-step-guide/</loc><lastmod>2026-04-08T14:06:57+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-11-network-sniffing-and-man-in-the-middle-mitm-attack/lessons/11-1-1-network-sniffing-and-mitm-overview/</loc><lastmod>2026-04-08T14:14:23+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-11-network-sniffing-and-man-in-the-middle-mitm-attack/lessons/11-1-2-step-by-step-exercise-network-sniffing-and-man-in-the-middle-mitm/</loc><lastmod>2026-04-08T14:30:49+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-11-network-sniffing-and-man-in-the-middle-mitm-attack/lessons/11-2-1-step-by-step-guide-man-in-the-middle-mitm-attack-using-mitmproxy/</loc><lastmod>2026-04-08T14:28:44+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-12-basic-penetration-testing-with-nmap/lessons/12-1-1-basic-penetration-testing-with-nmap/</loc><lastmod>2026-04-08T14:55:48+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-12-basic-penetration-testing-with-nmap/lessons/12-2-1-step-by-step-guidepractical-exercise-basic-penetration-test-with-nmap/</loc><lastmod>2026-04-08T14:56:37+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-12-basic-penetration-testing-with-nmap/lessons/12-3-1-advanced-penetration-testing-with-nmap/</loc><lastmod>2026-04-08T14:57:33+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-13-simulating-denial-of-service-dos-attack/lessons/13-1-1-overview-and-attack-steps/</loc><lastmod>2026-04-08T16:43:37+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-13-simulating-denial-of-service-dos-attack/lessons/13-2-1-step-by-step-guidepractical-exercise-simulating-a-denial-of-service-dos-attack-using-loic/</loc><lastmod>2026-04-08T16:47:27+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-13-simulating-denial-of-service-dos-attack/lessons/13-3-1-ddos-attack-simulation-dashboard/</loc><lastmod>2026-04-08T16:51:14+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-14-building-a-virtual-private-network-vpn/lessons/14-1-building-an-vpn-step-by-step-guide/</loc><lastmod>2025-03-18T20:46:08+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-14-building-a-virtual-private-network-vpn/lessons/14-2-1-step-by-step-guidepractical-exercise-setting-up-a-vpn-server-with-openvpn-on-ubuntu/</loc><lastmod>2025-03-18T20:46:20+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-14-building-a-virtual-private-network-vpn/lessons/14-3-1-step-by-step-guidepractical-exercise-setting-up-a-vpn-server-with-openvpn-on-windows/</loc><lastmod>2025-03-18T20:46:38+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/15-1-transformer-performance/</loc><lastmod>2025-05-08T14:33:43+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/15-2/</loc><lastmod>2025-05-08T14:37:37+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/15-3-power-system-underload-anomaly-security-breach/</loc><lastmod>2025-05-08T14:40:43+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/15-4-power-system-overload-anomaly-security-breach/</loc><lastmod>2025-05-08T14:42:08+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/15-5-power-system-single-phase-short-security-breach/</loc><lastmod>2025-05-08T14:45:35+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/15-6-double-phase-short-circuit-fault-in-power-systems-and-its-cybersecurity-implications/</loc><lastmod>2025-05-08T14:48:44+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-15-virtual-labs-on-power-systems/lessons/introduction-to-cybersecurity-in-power-systems/</loc><lastmod>2025-05-08T14:50:24+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-6-2-cybersecurity-awareness-and-challenge-activity/</loc><lastmod>2026-03-23T13:33:34+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-8-2-password-hashing-cracking-interactive-lab/</loc><lastmod>2026-03-23T13:36:11+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/social-engineering-phishing-attack-simulation/</loc><lastmod>2026-03-11T14:07:53+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-2-cyber-offense/lessons/educational-demonstration-of-malware-infection-process/</loc><lastmod>2026-03-11T14:08:09+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-5-1-cybersecurity-awareness-and-challenge-activity/</loc><lastmod>2026-03-23T13:32:53+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-5-2-cyber-shield-data-sorting-challenge/</loc><lastmod>2026-03-23T13:33:01+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-10-2-activity-iot-network-defense-simulator/</loc><lastmod>2026-03-14T15:53:42+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-11-1-man-in-the-middle-mitm-cybersecurity-training-lab/</loc><lastmod>2026-03-11T14:31:32+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-9-1-cyber-security-training-game/</loc><lastmod>2026-03-11T14:31:16+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-12-1-cyber-security-vulnerability-scanner-lab/</loc><lastmod>2026-03-11T14:36:57+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-2-1-types-of-cyber-attack-tools/</loc><lastmod>2026-03-14T15:08:47+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-3/lessons/3-10-1-activity-man-in-the-middle/</loc><lastmod>2026-03-14T15:13:09+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-5-1-activity-cybersecurity-breach-investigation-dashboard/</loc><lastmod>2026-03-14T16:51:58+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-6-1-activity-ai-soc-dashboard-banking-dos-attack-simulation/</loc><lastmod>2026-03-16T09:56:37+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-cybersecurity-resources/lessons/4-7-activity-denial-if-service-bank-gateway/</loc><lastmod>2026-03-16T10:00:42+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-detecting-and-evaluating-ip-address-vulnerabilities/lessons/5-1-1-networking-basics/</loc><lastmod>2026-04-08T11:04:35+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-4-detecting-and-evaluating-ip-address-vulnerabilities/lessons/5-4-1-passive-vulnerability-assessment-using-open-source-intelligence-osint/</loc><lastmod>2026-03-18T13:43:47+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-1-1-password-overview/</loc><lastmod>2026-03-18T15:04:07+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-2-1-multi-factor-authentication/</loc><lastmod>2026-03-18T15:06:26+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-5-1-brute-force-password-attack-masterclass/</loc><lastmod>2026-03-18T15:12:01+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-5-2-brute-force-intelligence-lab/</loc><lastmod>2026-03-18T15:13:11+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-6/lessons/6-6-hashcat_cyberchef_mimikatz/</loc><lastmod>2026-03-18T15:17:14+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-1-1-phishing-lab/</loc><lastmod>2026-03-18T16:05:24+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-2-1-technical-phishing-simulation/</loc><lastmod>2026-03-18T16:04:06+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-1-2-phishing-demo-for-gmail-account/</loc><lastmod>2026-03-18T16:08:50+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-4-1-interactive-phishing-lab/</loc><lastmod>2026-03-18T16:15:48+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-5-1-blackeye-phishing/</loc><lastmod>2026-03-18T16:20:31+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-7-phishing-attack-simulation/lessons/7-6-1-phishing-exfiltration-lab/</loc><lastmod>2026-03-18T16:27:04+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-1-2-advanced-threat-intelligence-lab/</loc><lastmod>2026-03-20T15:10:31+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-7-1-trojan-attack-demo-lab/</loc><lastmod>2026-03-23T13:37:27+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-7-2-vpn-phishing-on-substation/</loc><lastmod>2026-03-23T13:37:33+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-7-3-soc-analyst-terminal/</loc><lastmod>2026-03-23T13:37:41+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-8-1-hashing-and-cracking-password-lab/</loc><lastmod>2026-03-23T13:36:06+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-1-introduction-to-cybersecurity/lessons/1-2-1-ethical-hacking-and-digital-forensics/</loc><lastmod>2026-03-23T10:49:55+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/course-overview/lessons/course-overview/</loc><lastmod>2026-03-23T14:09:42+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/course-overview/lessons/pre-module-exercise/</loc><lastmod>2026-03-24T14:24:02+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/course-overview/lessons/cybersecurity-awareness-examples/</loc><lastmod>2026-03-23T14:10:05+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-10-cybersecurity-in-power-system/lessons/10-1-cyber-grid-overview/</loc><lastmod>2026-03-24T10:59:33+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-10-cybersecurity-in-power-system/lessons/10-2-cyber-power-simulation/</loc><lastmod>2026-03-24T13:25:45+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-10-cybersecurity-in-power-system/lessons/10-3-blackout-overview/</loc><lastmod>2026-03-24T13:34:28+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-10-cybersecurity-in-power-system/lessons/10-4-simulation-using-kali-linux-burp-suite-dvwa/</loc><lastmod>2026-03-24T13:37:30+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-9-wi-fi-hacking-with-evil-twin-attack/lessons/9-4-1-evil-twin-wifite-lab/</loc><lastmod>2026-04-08T14:00:24+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-9-wi-fi-hacking-with-evil-twin-attack/lessons/9-5-1-evil-twin-attack-mitigation-ai-dashboard/</loc><lastmod>2026-04-08T14:04:18+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-11-network-sniffing-and-man-in-the-middle-mitm-attack/lessons/11-3-1-activity-mitm-attack-demo-on-education-institute/</loc><lastmod>2026-04-08T14:22:48+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-12-basic-penetration-testing-with-nmap/lessons/12-4-1-nmap-exercise-saving-scan-results/</loc><lastmod>2026-04-08T15:00:36+05:30</lastmod></url><url><loc>https://atmecyberarmor.com/courses/module-13-simulating-denial-of-service-dos-attack/lessons/13-1-2-cybersecurity-analysis-dos-ddos/</loc><lastmod>2026-04-08T16:56:28+05:30</lastmod></url></urlset>
