<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gslc.baremetalcyber.com/</loc>
    <lastmod>2026-03-16T23:59:16Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-16T23:59:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-16T23:59:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-16T23:59:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-16T23:59:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-16T23:59:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-1-decode-the-gslc-exam-structure-question-style-scoring-and-timing-strategy</loc>
    <lastmod>2026-02-14T05:23:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-2-build-a-spoken-study-plan-indexing-pacing-and-retake-ready-habits</loc>
    <lastmod>2026-02-14T05:24:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-3-command-core-cryptography-vocabulary-leaders-must-use-with-precision</loc>
    <lastmod>2026-02-14T05:24:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-4-select-symmetric-encryption-algorithms-based-on-speed-use-case-and-risk</loc>
    <lastmod>2026-02-14T05:24:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-5-manage-keys-safely-generation-storage-rotation-and-access-controls</loc>
    <lastmod>2026-02-14T05:24:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-6-apply-public-key-cryptography-for-identity-exchange-and-secure-workflows</loc>
    <lastmod>2026-02-14T05:24:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-7-explain-digital-signatures-for-integrity-nonrepudiation-and-trust-decisions</loc>
    <lastmod>2026-02-14T05:25:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-8-use-hashing-correctly-for-integrity-checks-and-tamper-detection</loc>
    <lastmod>2026-02-14T05:25:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-9-design-password-storage-that-survives-breaches-using-modern-hash-strategies</loc>
    <lastmod>2026-02-14T05:25:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-10-reinforce-crypto-decisions-with-practical-threat-models-and-failure-modes</loc>
    <lastmod>2026-02-14T05:26:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-11-lead-incident-response-as-a-lifecycle-with-clear-roles-and-authority</loc>
    <lastmod>2026-02-14T05:26:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-12-build-triage-discipline-severity-scope-impact-and-containment-priorities</loc>
    <lastmod>2026-02-14T05:26:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-13-preserve-evidence-correctly-chain-of-custody-logging-and-forensics-readiness</loc>
    <lastmod>2026-02-14T05:26:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-14-coordinate-communications-legal-pr-executives-and-affected-stakeholders</loc>
    <lastmod>2026-02-14T05:26:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-15-run-containment-choices-without-breaking-business-operations-or-safety</loc>
    <lastmod>2026-02-14T05:27:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-16-drive-eradication-and-recovery-with-verification-monitoring-and-closure-criteria</loc>
    <lastmod>2026-02-14T05:27:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-17-operationalize-lessons-learned-into-program-improvements-and-reduced-recurrence</loc>
    <lastmod>2026-02-14T05:27:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-18-build-business-continuity-planning-that-reflects-real-business-dependencies</loc>
    <lastmod>2026-02-14T05:27:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-19-design-disaster-recovery-targets-rto-rpo-testing-and-restoration-evidence</loc>
    <lastmod>2026-02-14T05:27:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-20-define-soc-mission-and-scope-that-matches-business-risk-and-maturity</loc>
    <lastmod>2026-02-14T05:27:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-21-choose-soc-operating-models-in-house-outsourced-hybrid-and-follow-the-sun</loc>
    <lastmod>2026-02-14T05:28:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-22-staff-a-soc-with-clear-roles-skills-and-escalation-paths</loc>
    <lastmod>2026-02-14T05:28:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-23-set-soc-metrics-that-drive-quality-not-ticket-volume-theater</loc>
    <lastmod>2026-02-14T05:28:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-24-build-use-cases-that-improve-detection-fidelity-and-analyst-confidence</loc>
    <lastmod>2026-02-14T05:29:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-25-improve-soc-handoffs-with-playbooks-case-management-and-evidence-standards</loc>
    <lastmod>2026-02-14T05:29:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-26-secure-the-sdlc-by-embedding-security-requirements-and-design-reviews</loc>
    <lastmod>2026-02-14T05:29:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-27-prioritize-application-risks-using-threat-modeling-and-abuse-case-thinking</loc>
    <lastmod>2026-02-14T05:29:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-28-operationalize-secure-coding-expectations-without-slowing-delivery-excessively</loc>
    <lastmod>2026-02-14T05:29:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-29-manage-dependency-and-component-risk-across-build-pipelines-and-releases</loc>
    <lastmod>2026-02-14T05:29:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-30-secure-infrastructure-as-code-with-reviews-policy-gates-and-guardrails</loc>
    <lastmod>2026-02-14T05:29:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-31-drive-devsecops-adoption-with-measurable-controls-and-shared-ownership</loc>
    <lastmod>2026-02-14T05:30:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-32-build-application-security-testing-strategy-sast-dast-sca-and-triage</loc>
    <lastmod>2026-02-14T05:30:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-33-explain-ai-types-and-capabilities-leaders-must-understand-to-govern-risk</loc>
    <lastmod>2026-02-14T05:30:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-34-evaluate-ai-business-benefits-without-confusing-demos-with-production-reality</loc>
    <lastmod>2026-02-14T05:30:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-35-manage-ai-security-risks-data-leakage-prompt-abuse-and-model-misuse</loc>
    <lastmod>2026-02-14T05:30:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-36-set-ai-governance-acceptable-use-access-controls-and-monitoring-expectations</loc>
    <lastmod>2026-02-14T05:31:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-37-master-cloud-service-models-and-shared-responsibility-without-blind-spots</loc>
    <lastmod>2026-02-14T05:31:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-38-secure-cloud-identity-roles-federation-mfa-and-least-privilege-enforcement</loc>
    <lastmod>2026-02-14T05:31:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-39-design-cloud-network-segmentation-to-reduce-blast-radius-and-lateral-movement</loc>
    <lastmod>2026-02-14T05:31:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-40-operationalize-cloud-logging-sources-normalization-retention-and-alert-quality</loc>
    <lastmod>2026-02-14T05:31:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-41-control-cloud-data-exposure-storage-permissions-keys-and-configuration-drift</loc>
    <lastmod>2026-02-14T05:32:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-42-manage-cloud-risk-with-baselines-policies-and-exception-handling-that-scales</loc>
    <lastmod>2026-02-14T05:32:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-43-protect-data-in-transit-using-tls-choices-and-certificate-hygiene</loc>
    <lastmod>2026-02-14T05:32:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-44-protect-data-at-rest-using-encryption-key-custody-and-access-patterns</loc>
    <lastmod>2026-02-14T05:33:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-45-translate-privacy-requirements-into-controls-minimization-retention-and-access</loc>
    <lastmod>2026-02-14T05:33:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-46-align-compliance-expectations-with-practical-security-evidence-and-continuous-checks</loc>
    <lastmod>2026-02-14T05:34:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-47-negotiate-security-outcomes-with-vendors-using-requirements-evidence-and-leverage</loc>
    <lastmod>2026-02-14T05:34:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-48-build-vendor-risk-management-intake-due-diligence-and-ongoing-monitoring</loc>
    <lastmod>2026-02-14T05:34:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-49-manage-third-party-contracts-slas-audit-rights-breach-terms-and-ownership</loc>
    <lastmod>2026-02-14T05:34:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-50-run-security-projects-scope-schedule-risk-and-stakeholder-commitments</loc>
    <lastmod>2026-02-14T05:35:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-51-build-business-support-for-security-work-using-value-cost-and-tradeoffs</loc>
    <lastmod>2026-02-14T05:35:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-52-handle-project-drift-change-control-dependencies-and-delivery-evidence</loc>
    <lastmod>2026-02-14T05:35:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-53-assess-human-risk-drivers-roles-behaviors-and-likely-failure-points</loc>
    <lastmod>2026-02-14T05:35:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-54-design-security-awareness-that-changes-behavior-and-reduces-real-incidents</loc>
    <lastmod>2026-02-14T05:35:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-55-mature-awareness-programs-using-metrics-reinforcement-and-targeted-campaignsthis-episode-focuses-on-maturing-an-awareness-program-over-time-using-metrics-and-targeted-reinforcement-matching-exam-objectives-that-emphasize-programs-which-evo</loc>
    <lastmod>2026-02-14T05:35:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-56-write-security-policies-that-people-can-follow-and-auditors-can-verify</loc>
    <lastmod>2026-02-14T05:36:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-57-distinguish-policies-standards-guidelines-baselines-and-procedures-correctly</loc>
    <lastmod>2026-02-14T05:36:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-58-align-policy-with-risk-appetite-exceptions-and-accountability-mechanisms</loc>
    <lastmod>2026-02-14T05:36:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-59-recognize-client-side-attacks-leaders-must-anticipate-and-prevent</loc>
    <lastmod>2026-02-14T05:36:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-60-reduce-malware-risk-with-controls-hardening-edr-strategy-and-response-hooks</loc>
    <lastmod>2026-02-14T05:36:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-61-monitor-endpoints-effectively-telemetry-coverage-tuning-and-noise-reduction</loc>
    <lastmod>2026-02-14T05:36:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-62-balance-endpoint-protection-prevention-detection-isolation-and-recovery-evidence</loc>
    <lastmod>2026-02-14T05:37:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-63-design-program-structure-around-culture-reporting-lines-and-decision-rights</loc>
    <lastmod>2026-02-14T05:37:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-64-establish-security-governance-committees-charters-metrics-and-ownership-clarity</loc>
    <lastmod>2026-02-14T05:38:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-65-manage-security-personnel-hiring-coaching-performance-and-retention-levers</loc>
    <lastmod>2026-02-14T05:38:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-66-operationalize-program-management-roadmaps-backlogs-dependencies-and-proof</loc>
    <lastmod>2026-02-14T05:38:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-67-centralize-logging-strategically-what-to-collect-why-and-how-long</loc>
    <lastmod>2026-02-14T05:38:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-68-lead-siem-operations-parsing-correlation-use-case-quality-and-maintenance</loc>
    <lastmod>2026-02-14T05:38:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-69-apply-soar-thoughtfully-automation-scope-guardrails-and-human-override</loc>
    <lastmod>2026-02-14T05:39:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-70-evaluate-machine-learning-in-monitoring-benefits-limits-and-data-requirements</loc>
    <lastmod>2026-02-14T05:39:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-71-build-network-security-architecture-using-trust-models-and-control-placement</loc>
    <lastmod>2026-02-14T05:39:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-72-select-network-controls-for-threats-segmentation-filtering-and-inspection</loc>
    <lastmod>2026-02-14T05:39:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-73-explain-networking-protocols-and-technologies-managers-must-command-confidently</loc>
    <lastmod>2026-02-14T05:39:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-74-identify-common-network-threats-and-map-them-to-defensive-priorities</loc>
    <lastmod>2026-02-14T05:39:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-75-evaluate-risk-in-business-terms-using-likelihood-impact-and-exposure</loc>
    <lastmod>2026-02-14T05:40:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-76-adopt-security-frameworks-to-mature-programs-without-checkbox-compliance</loc>
    <lastmod>2026-02-14T05:40:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-77-apply-risk-techniques-treatment-options-registers-and-decision-documentation</loc>
    <lastmod>2026-02-14T05:40:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-78-defend-security-priorities-with-evidence-metrics-narratives-and-tradeoffs</loc>
    <lastmod>2026-02-14T05:40:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-79-build-vulnerability-management-as-a-program-not-a-scanning-habit</loc>
    <lastmod>2026-02-14T05:41:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-80-prioritize-vulnerabilities-using-context-exposure-criticality-and-exploit-signals</loc>
    <lastmod>2026-02-14T05:41:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-81-drive-remediation-workflows-ownership-slas-exceptions-and-verification-evidence</loc>
    <lastmod>2026-02-14T05:41:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/episode-82-include-physical-vulnerabilities-facilities-devices-and-environmental-dependencies</loc>
    <lastmod>2026-02-14T05:42:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gslc.baremetalcyber.com/episodes/welcome-to-certified-the-giac-gslc-audio-course</loc>
    <lastmod>2026-02-10T23:25:15Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
