<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://freecybereducation.com/blue-team-content/</loc><lastmod>2024-12-20T21:05:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/preventing-phishing-attacks/</loc><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/paste-your-dmarc-record-here-in-the-value-field.jpg</image:loc><image:title>Paste-your-DMARC-record-here-in-the-Value-field</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/creating-a-dkim-record.jpg</image:loc><image:title>creating-a-dkim-record</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/spf-example.png</image:loc><image:title>spf-example</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/freecyber-spf-lookup.png</image:loc><image:title>freecyber-spf-lookup</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/external-tag.png</image:loc><image:title>external-tag</image:title></image:image><lastmod>2024-12-20T21:04:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/how-to-remediate-phishing-attacks/</loc><lastmod>2024-12-20T21:03:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/email-security-phishing-analysis/</loc><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/untitled.png</image:loc><image:title>Untitled</image:title></image:image><lastmod>2024-12-20T19:48:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/investigating-suspicious-emails/</loc><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/url-expander.png</image:loc><image:title>url-expander</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/email-investigation-part2.png</image:loc><image:title>email-investigation-part2</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/email-investigation-part1.png</image:loc><image:title>email-investigation-part1</image:title></image:image><image:image><image:loc>https://freecybereducation.com/wp-content/uploads/2024/12/downloading-emails.png</image:loc><image:title>downloading-emails</image:title></image:image><lastmod>2024-12-12T19:22:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/osint-tools/</loc><lastmod>2024-12-12T05:17:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/donations/</loc><lastmod>2024-12-12T04:59:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/certification-focused-content/</loc><lastmod>2024-12-11T20:04:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/major-cybersecurity-tools/</loc><lastmod>2024-12-11T20:04:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com/red-team-content/</loc><lastmod>2024-12-11T20:04:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://freecybereducation.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-12-20T21:05:03+00:00</lastmod></url></urlset>
