<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Basic-Business-Skills</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Budgeting-and-Financial-Skills-In-IT-Operations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Explicit-vs-Tacit-Learning</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Learning-and-strategies-for-improvement</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Preparing-Your-Toolbelt</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Role-of-IT-Operations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills-201</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Business-Acumen</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Communication-Modes</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Communication-basics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Distilling-Information-for-Impact</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/8.-Site-Reliability-Engineering</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Backup-Strategy</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Business-Continuity-Planning</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Capacity-Planning</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Capital-Expenditure-(CapEx)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Developing-A-Backup-Strategy</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Developing-A-Documentation-Content-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Documentation-Content-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Environmental-Risk-Mitigation</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/IT-Service-Management</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Service-Management/ITIL-4-Foundations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Methodology/Service-Management/ITIL-Examples-in-Action</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Negotiating-Budgetary-Constraints--and--Need-vs-Want-Requirements</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Patterns-and-anti-patterns</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Personal-Development</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Project-Management</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Promoting-Change</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Selling-system-changes-and-new-proposals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Soft-Skills-101</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Special-Cases-for-Operations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/The-Importance-of-Documentation</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Thinking-broadly-and-Holistically</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Time-Management</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Understanding-Your-Audience-for-Effective-Communication</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Soft-Skills/Working-with-other-Teams</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Statistics-for-IT</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/The-Importance-of-Procedure</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Troubleshooting-Methodology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Troubleshooting</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Types-of-Learning</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.2.-Prerequisite-Course/Working-Effectively-in-Crisis</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3-Other/Projects</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3-Other/second-brain</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Blue-Team-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Cyber-Security---In-demand-Skills</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Governance,-Risk-and-Compliance-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Job-Role-Information---Penetration-Tester</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/OSINT-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Phishing-Campaign-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Purple-Team</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Cybersecurity/Red-Team-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/OpenMSP---A-Guide-for-The-Aspiring-IT-Professional</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Database-Administration-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Docker-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/IT-Helpdesk-Professional-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/IT-Networking-Professional-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/IT-Security-Operations-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Kubernetes-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Linux-Administrator-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/M365-Administrator-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Storage-Engineer-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Virtualization-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/0.3.-Learning-Paths/Operations/Windows-Administrator-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/ICT20120-Certificate-II-in-Applied-Digital-Technologies</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/ICT30120-Certificate-III-in-Information-Technology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/ICT40120-Certificate-IV-in-Information-Technology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/ICT50120-Diploma-of-Information-Technology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/ICT60120-Advanced-Diploma-of-Information-Technology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/Qualifications</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/AQF/Related-Resources</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Certifications</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Community-Resources</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/FAQ</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/Beginner-Certifications</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/Cisco-NetAcademy</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/HackTheBox</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/Learning-Content-Platforms</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/LinuxJourney</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/TCM-Security-Academy</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.0.-Resources/Platforms/roadmap.sh</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/1.-How-to-Use-this-Resource</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/2.-What-Equipment-you-Require</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/3.-Knowledge-Base-Home</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/4.-Prerequisite-Course</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/Specialized-Career-Paths</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/The-Five-Pillars-of-Cybersecurity</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/Typical-Career-Path</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/00-Learn/0.1.-Start/What-are-the-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/1.1-Start/1.1-General-Computing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/1.1-Start/1.2-History-of-Computing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/1.1-Start/1.3-Computer-Hardware</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/1.1-Start/4.-How-a-Computer-Computes</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Boot/Basic-Input-Output-System-(BIOS)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Boot/Compatibility-Support-Module--(CSM)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Boot/GUID-Partition-Table-(GPT)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Boot/Legacy-Boot</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Boot/Master-Boot-Record-(MBR)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Boot/Unified-Extensible-Firmware-Interface</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Central-Processing-Unit-(CPU)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Graphics-Processing-Unit-(GPU)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Hard-Disk-Drives-(HDD)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Motherboard-(MOBO)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Power-Supply-Unit-(PSU)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Random-Access-Memory-(RAM)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Solid-State-Drives-(SSD)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Computer-Hardware/Southbridge-(MOBO)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Apple-File-System-(APFS)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/BTRFS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Block-Storage</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/CIFS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Ceph</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/EFI</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/EXT4</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/FAT32</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/File-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/File-Types</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/HFS+</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/NAS-vs-SAN</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/NTFS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Network-File-System-(NFS)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Object-Storage</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/RAID</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Remote-File-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/Server-Message-Block-(SMB)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/XFS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/ZFS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/01-Computing-Fundamentals/Computer-Components/Storage/exFAT</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/4.1-Start/Difference-between-Programming-and-Scripting-Languages</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/4.1-Start/Programming</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/4.1-Start/Scripting</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/Scripting--and--Shells/Ansible/Ansible</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/Scripting--and--Shells/Bash/Bash-Syntax-Logic</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/Scripting--and--Shells/Bash/Bash</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/Scripting--and--Shells/Bash/Quoting-in-Bash</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/Scripting--and--Shells/Terraform/Terraform</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/04-Programming--and--Scripting/YAML</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Computer-Science</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Abstraction</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Binary-System</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Bits-and-Bytes</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Compliers</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Encoding</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Process-Trees</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Low-Level-Concepts/Threads</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Application-Components</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Application-Programming-Interface-(API)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Applications</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Arithmetic-Operations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Basics-of-Debugging</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Boolean-Expressions</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Conditional-Statements</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Data-Structures</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Dictionaries-in-Data-Structures</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Functions</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/High-Level-Vs-Low-Level-Programming</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Lists-in-Data-Structures</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Loops</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Methods-in-Programming</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Modules--and--Libraries</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Programming-Concepts</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Sockets</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Statically-Typed-Variables</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Strings-in-Data-Structures</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Strings-in-Programming</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Tuples-in-Data-Structures</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/User-Input</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Variable-Best-Practices</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Variables</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Writing-Pseudocode</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/02-Computer-Science/Programming-Concepts/Writing-Reusable-and-Testable-Code</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/2.-Information-Technology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/AI-Model-Prompts/ChatGPT---Jailbreak-Prompt</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Endpoint-Management/Endpoint-Management-Solutions</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Endpoint-Management/FleetDM</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Endpoint-Management/Intune</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Endpoint-Management/JAMF</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Microsoft-365</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Microsoft</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/SaaS,-IaaS,-PaaS,-CaaS,-What-does-it-all-mean</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Business-IT/Shared-Responsibility-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Cryptography/Certificate-Management-Architecture</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Cryptography/Handshakes</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Object-Storage/S3-as-a-Protocol</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Open-Source--and--Licensing/BSD---Berkeley-Software-Distribution</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Open-Source--and--Licensing/Creative-Commons</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Open-Source--and--Licensing/GNU</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Open-Source--and--Licensing/IEEE-(Institute-of-Electrical-and-Electronics-Engineers)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Open-Source--and--Licensing/Open-Source-Business-Models</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Open-Source--and--Licensing/Open-Source-Licensing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/3.-System-Administration</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Chroot,-Jails-and-Containers</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/CompTIA-Linux+</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/FreeBSD</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/History-Of-Unix</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Linux-Certifications</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Linux-Distributions</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Linux-File-System-Structure-Explained</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Linux-Forensics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Linux-Resources</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Linux</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/Unix-based-Operating-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/commands/the-locate-command</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/commands/the-man-command</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/commands/the-whatis-command</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Linux/shell</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Operating-System-Kernel</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Operating-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/POSIX-(Portable-Operating-System-Interface)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Proxmox/Proxmox-Backup-Server-Sync-Jobs</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Proxmox/Proxmox-Cluster-Subnet-Changeover---CoroSync-Stuff</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Proxmox/Proxmox-Clustering</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/Proxmox/Proxmox</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/What-is-a-Server</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/arch/Arch-Linux-Setup-v2</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/arch/Arch-Linux-Setup-v3</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/arch/Arch-Linux-Setup</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/arch/arch-linux-highlevel</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/dotfiles</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Active-Directory</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Domain-User-Administration</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Five-Hives</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Group-Policy-Objects</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Organizational-Units-and-Groups</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Password-less-FIDO2-Security-Key-Sign-in-to-Windows-10-</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Powershell</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/System-Center-Configuration-Manager-(SSCM)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Windows-Deployment--and--Management-Tools</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Windows-Forensics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Windows</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Operating-Systems/windows/Workgroups</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Relational-Databases/MySQL</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Relational-Databases/PostgreSQL</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Relational-Databases/SQL-shell</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Relational-Databases/Structured-Query-Language</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Containers</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Docker-Compose</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Docker</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Guest-Operating-System</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Host-Operating-System</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Hypervisors</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Kubernetes</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/OpenStack---Telecom</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Virtual-Machine</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/03-Information-Technology/Virtualization/Virtualization</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/4.-Networking</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Aircrack-ng-Suite</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Basics-of-Subnetting</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Cisco/Cisco---Intro-to-Cybersecurity</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Cisco/Cisco-Network-Addressing-and-Basic-Troubleshooting</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Cisco/Cisco-Networking-Basics---Notes</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Cisco/Cisco-Networking-Basics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Cisco/cisco-packet-tracer-activity</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Common-Network-Protocols-and-their-Uses</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Common-Ports-and-their-Uses</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Common-Software-Suites</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Computer-Networking-Basics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Computer-Networking</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/How-Web-servers-work</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/IP-Addressing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/IP-Terminology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/IPv4-Addressing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/LDAP</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Local-Authentication</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Mesh-Network-Topology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Network-Authentication-Methodologies</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Network-Router</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Network-Services</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Network-Terminology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Network-Topologies</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Network-Troubleshooting-Tools</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking-Knowledge</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Bus-Network-Topology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/CAT-Network-Cabling-Resources</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Domain-Name-System</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Firewalls</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/IPv6-Addressing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Network-Forensics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Network-Operations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Network-Switches</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Network-Traffic-Analysis</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/OSI-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Packets--and--Frames</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Port-Forwarding</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Tools-Related-to-Inspecting-Network-Traffic/Snort</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Tools-Related-to-Inspecting-Network-Traffic/Suricata</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Tools-Related-to-Inspecting-Network-Traffic/Tcpdump</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/Tools-Related-to-Inspecting-Network-Traffic/Wireshark</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Networking/VPN---Virtual-Private-Network</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/RADIUS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Ring-Network-Topology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/SNMP-and-Syslog---Network-Monitoring-Fundamentals</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/SSL--and--TLS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/SSO---Single-Sign-On</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Star-Network-Topology</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/WPA---Wi-Fi-Protected-Access</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Wi-Fi-Standards</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/04-Computer-Networking/Wifi-Hacking</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/5.-Cybersecurity</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/CTFs/Capture-The-Flag-(CTF)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/CTFs/GoogleCTF</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/CTFs/niteCTF</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/CTFs/picoCTF</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Crowd-Sourced-Inteligence/Cyber-Threat-Intelligence</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Crowd-Sourced-Inteligence/Mobile-Threat-Catalogue</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Digital-Forensics/Tools/REMNUX---VM</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Digital-Forensics/Tools/SIFT-Workstation</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Encryption/Bitlocker</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Encryption/Cryptography</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Encryption/Kerberos</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Encryption/LUKS2</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Encryption/Secure-Boot</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Encryption/Secure-Device-Disposal</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Digital-Forensics-and-Incident-Response</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Digital-Forensics</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process/1.-Incident-Response-Process---Preparation</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process/2.-Incident-Response-Process---Identification</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process/3.-Incident-Response-Process---Containment</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process/4.-Incident-Response-Process---Eradication</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process/5.-Incident-Response-Process---Recovery</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response-Process/6.-Incident-Response-Process---Lessons-Learned</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/IR--and--Forensics/Incident-Response/Incident-Response</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Red-Team/Content-Security-Policy</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Red-Team/Offensive-Security</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Red-Team/Pivoting--and--Lateral-Movement</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Red-Team/Professional-Network-Penetration-Tester---PNPT</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Red-Team/Sock-Puppets</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/CIS-Hypervisor-Best-Practices</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/Essential-Eight/EE-Patching-Applications-and-Operating-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/Essential-Eight/Essential-Eight---Restricting-Office-Macros</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/Essential-Eight/Essential-Eight---Suggested-mitigation-strategy-implementation-order</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/Essential-Eight/Essential-Eight-Maturity-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/NIST-Assessment---Action-Plan</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/NIST-Cybersecurity-Framework---Assessment-Tool</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/NIST-SP-800-124r2-Guidelines-for-Managing-the-Security-of-Mobile-Devices-in-the-Enterprise</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/NSA-Home-Network-Security-Recommendations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/SANS-Security-Policy-Templates</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Best-Practice/Strategies-to-Mitigate-Cyber-Security-Incidents</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Cyber-Security</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Labs---Learning/GOAD</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Labs---Learning/Owasp-Juice-Shop</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Labs---Learning/Virtual-Machines-to-Hack---VulnHub</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Labs---Learning/vulnerable-AD-plus</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Security-Auditing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Single-Sign-On</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Resources/Web-Security</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Attack-Chain/Cyber-Kill-Chain</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Attack-Chain/Unified-Kill-Chain</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Attack-Concepts/Command-and-Control</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Attack-Concepts/Enumeration</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Attack-Concepts/OSINT-Framework</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Authentication,-Authorization-and-Accouting-(AAA)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Authentication</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Authorization</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Bell-La-Padula-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Biba-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/BlackArch</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/CIA-Triad</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Concept-of-Operation</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Credential-Hygiene</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Cyber-Defense-Frameworks</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/DREAD</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Defense-In-Depth</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Defensive-Network-Tooling</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Defensive-Security-Tooling</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Diamond-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Endpoint-Protection-(AV)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Endpoint-Protection-(EDR)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Governance,-Risk-and-Compliance</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Identity-and-Access-Management</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Indicators-of-Compromise</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Intrusion-Detection-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Intrusion-Prevention-Systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Kali-Linux</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Least-Privilege</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Logging</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/MITRE-D3FEND</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/MITRE</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Malware-Analysis</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Multi-Factor-Authentication</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/NSA-Compromised-Network-Indicators</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/OWASP-Top-10</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/PASTA</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/PESTLE-Model</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/PSPF---Security-Governance</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/ParrotOS</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Protective-Security-Policy-Framework</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Pyramid-of-Pain</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Risk-and-Control</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/STRIDE</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Security-Hardening</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Security-Operations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Security-Orchestration,-Automation--and--Response-(SOAR)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/Security-Principles</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Defense/sandboxes--and--sandboxing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Security-Frameworks,-Standards-and-Regulations</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Advanced-Persistent-Threat-Groups</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Malware</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Network-Based-Attacks</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Physical-Attacks</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Replay-Attack</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Social-Engineering</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Supply-Chain-Attacks</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Threat-Actors-and-Groups</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Threat-Classification</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Threat-Intelligence</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Threat-Modelling</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Threats/Wireless-Attacks</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Vulnerability-Management/Vulnerabilities-vs-Exploits</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Vulnerability-Management/Vulnerability---Cybersecurity</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Vulnerability-Management/Vulnerability-Databases</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Security-Concepts--and--Frameworks/Vulnerability-Management/Vulnerability-Management</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tool-Guides/BurpSuite---Guide</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tool-Guides/Nmap---Guide</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/BeEF---Browser-Exploitation-Framework</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Bettercap</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Bloodhount---Active-Directory-Sniffing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/BurpSuite</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/CUPP---Common-User-Passwords-Profiler</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Cred-Sniper</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Distros-for-Security-Tooling</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Evilginx-3.0</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Flipper-Zero</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Gobuster</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/How-to-Use-John-the-Ripper---A-Quick-and-Easy-Guide</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Hydra</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/John-the-Ripper</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Krack-Attacks</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Maltego</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Metasploit</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/NetworkMiner</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Nmap</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Powershell-Empire</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Rubeus</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/SQLMap</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Search-Utilities</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Security-Information--and--Event-Management-(SIEM)</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Sophos-APJ-Cyber-Security-Playbook</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/TShark</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Using-Maltego</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/Wazuh</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/Tools/haveibeenpwned</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/TryHackMe/z.-tryhackme/Knowledge-Check---CCST</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/TryHackMe/z.-tryhackme/TryHackMe---Progress-update</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/TryHackMe/z.-tryhackme/TryHackMe</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/06-Cybersecurity/TryHackMe/z.-tryhackme/TryHackme---Blue</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/7.-Cloud-Engineering</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/7.-System-Design</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/Configuration-Management-201</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/Configuration-Management</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/Idempotence</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/Infrastructure-as-Code</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/Puppet-Agent--and--Master-Communication</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/Puppet</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/SaltStack</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Configuration-Management/What-is-DevOps</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Convergent-and-Congruent-systems</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Diagonal-Scaling</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Finding-Capacity-ceilings</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Forecasting</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Resource-usage-investigation-and-exploration</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Site-Reliability-Engineering</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/Software-Deployment</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/07-Systems-Design--and--Architecture/hyperscaler</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/changelog</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/getting-started</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/paths/file-sharing</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/paths/netbird-vpn</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/paths/networking</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url><url>
    <loc>https://ITLearn.claytownsend.com.au/paths/vyos-proxmox</loc>
    <lastmod>2026-03-10T03:54:55.000Z</lastmod>
  </url></urlset>