<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cybersecfaith.com/2023/02/24/year-2022-in-book-review/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2023/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2023/02/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2023/02/20230103_205540.jpg</image:loc><image:title>20230103_205540</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2023/02/20230103_205547.jpg</image:loc><image:title>20230103_205547</image:title></image:image><lastmod>2023-02-24T23:12:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/engagements/</loc><lastmod>2022-06-27T08:42:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecfaith.com/about/</loc><lastmod>2022-06-13T08:20:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecfaith.com/2022/01/17/year-2021-in-book-review/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2022/01/20220102_183110.jpg</image:loc><image:title>20220102_183110</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2022/01/20220104_140128.jpg</image:loc><image:title>20220104_140128</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2022/01/20220104_140457.jpg</image:loc><image:title>20220104_140457</image:title></image:image><lastmod>2022-01-17T18:13:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/10/31/building-my-home-lab-part-4-deploying-the-domain-controller-and-endpoints/</loc><lastmod>2021-10-31T12:09:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/01/01/year-2020-book-review/</loc><lastmod>2021-09-12T17:40:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/08/10/building-my-home-lab-part-3-deploying-the-core-infrastructure-hypervisorfirewall-and-router/</loc><lastmod>2022-05-16T14:21:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/05/08/building-my-home-lab-part-1-assembly/</loc><lastmod>2021-11-13T13:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/07/03/building-my-home-lab-architecture/</loc><lastmod>2021-11-13T13:38:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/07/19/writeup-hackthebox-bashed/</loc><lastmod>2021-07-19T22:51:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/01/13/kringlecon-2-turtle-doves-writeup/</loc><lastmod>2021-06-29T22:31:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/12/01/writeup-advent-of-ctf-0/</loc><lastmod>2021-06-29T22:31:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/12/01/writeup-advent-of-ctf-1-the-source/</loc><lastmod>2021-06-29T22:30:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/12/02/writeup-advent-of-ctf-2-cookiemonster/</loc><lastmod>2021-06-29T22:30:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/12/03/writeup-advent-of-ctf-3-javascript/</loc><lastmod>2021-06-29T22:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/12/05/writeup-advent-of-ctf-4-obfuscation/</loc><lastmod>2021-06-29T22:30:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/12/06/writeup-advent-of-ctf-5/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2020/12/080b5d5fcaf13167d2e7e8871fdc8ded-1.png</image:loc><image:title>080b5d5fcaf13167d2e7e8871fdc8ded</image:title></image:image><lastmod>2021-06-29T22:30:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/01/11/kringlecon3-french-hens-writeup/</loc><lastmod>2021-06-29T22:30:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/02/21/devslop-kubernetes-ctf-writeup/</loc><lastmod>2021-06-29T22:30:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/23/writeup-hackthebox-blue/</loc><lastmod>2021-06-29T22:29:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/24/writeup-hackthebox-devel/</loc><lastmod>2021-06-29T22:29:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/26/writeup-hackthebox-jerry/</loc><lastmod>2021-06-29T22:29:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/27/writeup-hackthebox-nibbles/</loc><lastmod>2021-06-29T22:29:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/27/writeup-hackthebox-optimum/</loc><lastmod>2021-06-29T22:29:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/27/writeup-hackthebox-grandpa/</loc><lastmod>2021-06-29T22:29:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/06/13/my-giac-certified-forensic-analyst-gcfa-experience/</loc><lastmod>2023-01-01T20:49:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/11/01/setting-up-an-ipsec-vpn-using-cisco-packet-tracer/</loc><lastmod>2022-07-18T10:23:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2021/05/02/setting-up-a-2-in-1-vm-for-labs-using-windows-subsystem-linux-wsl/</loc><lastmod>2021-05-02T15:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/23/ccnp-wireless/</loc><lastmod>2020-10-23T08:59:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/08/26/passed-ccna-wireless-exam-moving-on-to-ccnp-wireless/</loc><lastmod>2020-10-22T17:50:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/15/passed-ccnp-cuwss-wireless-exam-moving-on-to-ccnp-iuwms-wireless/</loc><lastmod>2020-10-22T17:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/10/09/cisco-wireless-cisco-prime-infrastructure-2-0-summary-notes/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014-10-13-10_59_51-cisco-prime-infrastructure-2-0-deployment-guide-2-pdf-adobe-reader.png</image:loc><image:title>2014-10-13 10_59_51-Cisco Prime Infrastructure 2.0 Deployment Guide (2).pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_13_10_53_13_greenshot.png</image:loc><image:title>2014_10_13_10_53_13_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_13_10_48_11_cisco_prime_infrastructure_2-0_deployment_guide_2_-pdf_adobe_reader.png</image:loc><image:title>2014_10_13_10_48_11_Cisco_Prime_Infrastructure_2.0_Deployment_Guide_2_.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014-10-13-10_41_56-cisco-prime-infrastructure-2-0-deployment-guide-2-pdf-adobe-reader1.png</image:loc><image:title>2014-10-13 10_41_56-Cisco Prime Infrastructure 2.0 Deployment Guide (2).pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014-10-13-10_41_56-cisco-prime-infrastructure-2-0-deployment-guide-2-pdf-adobe-reader.png</image:loc><image:title>2014-10-13 10_41_56-Cisco Prime Infrastructure 2.0 Deployment Guide (2).pdf - Adobe Reader</image:title></image:image><lastmod>2020-10-11T09:29:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/23/ccnp-wireless-cuwss-642-732-summary-notes-14-layer-2-active-site-survey-airmagnet-survey-pro/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-19_40_56-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 19_40_56-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-19_39_02-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 19_39_02-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-19_37_42-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 19_37_42-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-19_31_33-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 19_31_33-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><lastmod>2020-10-10T21:59:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/10/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-3-estimating-the-number-of-aps-2/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_29_21_57_09_nmdcbpwlc100.png</image:loc><image:title>2014_11_29_21_57_09_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_29_21_43_49_nmdcbpwlc1001.png</image:loc><image:title>2014_11_29_21_43_49_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_29_21_43_49_nmdcbpwlc100.png</image:loc><image:title>2014_11_29_21_43_49_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_29_13_07_50_cuwss_v1-0_student_guide_vol2-pdf_adobe_reader.png</image:loc><image:title>2014_11_29_13_07_50_CUWSS_v1.0_Student_Guide_Vol2.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_27_22_43_48_cuwss_v1-0_student_guide_vol2-pdf_adobe_reader.png</image:loc><image:title>2014_11_27_22_43_48_CUWSS_v1.0_Student_Guide_Vol2.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_27_22_33_59_nmdcbpwlc100.png</image:loc><image:title>2014_11_27_22_33_59_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_27_22_31_23_nmdcbpwlc100.png</image:loc><image:title>2014_11_27_22_31_23_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014-11-11-06_57_25-cuwss-v1-0-student-guide_vol1-pdf-adobe-reader.png</image:loc><image:title>2014-11-11 06_57_25-CUWSS v1.0 Student Guide_Vol1.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_09_22_08_12_38_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_09_22_08_12_38_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-10T21:59:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/25/ccna-wireless-summary-notes-understanding-wireless-client/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_25_16_53_39_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_06_25_16_53_39_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_25_16_52_59_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_06_25_16_52_59_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_25_16_42_43_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_06_25_16_42_43_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-10T21:59:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/20/ccda-640-864-summary-notes-chapter-5-day-12/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_20_16_59_05_air_ap1261n_a_k9-jpg_1028_1072_.png</image:loc><image:title>2013_09_20_16_59_05_AIR_AP1261N_A_K9.jpg_1028_1072_</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_20_16_57_37_1250front-jpg_1500_1200_.png</image:loc><image:title>2013_09_20_16_57_37_1250front.jpg_1500_1200_</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_20_16_39_24_cisco_aironet_1240ag_wireless_access_point_air_ap1242ag_a_k_mlm_f_3093534585_082.png</image:loc><image:title>2013_09_20_16_39_24_cisco_aironet_1240ag_wireless_access_point_air_ap1242ag_a_k_MLM_F_3093534585_082</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_20_16_12_38_cisco_aironet_3500-jpg_1500_1200_.png</image:loc><image:title>2013_09_20_16_12_38_Cisco_Aironet_3500.jpg_1500_1200_</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_20_15_56_05_5397-jpg_1500_1200_.png</image:loc><image:title>2013_09_20_15_56_05_5397.jpg_1500_1200_</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_20_15_35_07_cisco_aironet_1130ag-jpg_2776_2196_.png</image:loc><image:title>2013_09_20_15_35_07_Cisco_Aironet_1130AG.jpg_2776_2196_</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/untitled51.png</image:loc><image:title>Untitled5</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/untitled5.png</image:loc><image:title>Untitled5</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/untitled4.png</image:loc><image:title>Untitled4</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/untitled3.png</image:loc><image:title>Untitled3</image:title></image:image><lastmod>2020-10-10T21:58:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/17/ccda-640-864-summary-notes-chapter-5-day-9/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/ism-usage.gif</image:loc><image:title>ISM-usage</image:title></image:image><lastmod>2020-10-10T21:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-5/</loc><lastmod>2020-10-10T21:58:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-4/</loc><lastmod>2020-10-10T21:57:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/05/22/configuring-bgp/</loc><lastmod>2020-10-10T21:56:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/05/22/troubleshooting-ip-phone-registration/</loc><lastmod>2020-10-10T21:55:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/06/05/comparing-the-cisco-telepresence-sx20-and-codec-40/</loc><lastmod>2020-10-10T21:51:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/14/how-to-perform-carrier-busy-test-on-cisco-ap/</loc><lastmod>2020-10-10T21:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/18/configure-aaa-with-local-authentication-on-cisco-router/</loc><lastmod>2020-10-10T21:46:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/19/how-to-configure-a-named-access-list-to-deny-traffic-from-a-visitor-vlan-to-internal-resources/</loc><lastmod>2020-10-10T21:44:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/19/how-to-configure-a-router-ro-be-a-dns-server/</loc><lastmod>2020-10-10T21:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/19/how-to-configure-multiple-ssids-on-cisco-ap1141/</loc><lastmod>2020-10-10T21:42:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/21/basic-dhcp-configuration-on-a-cisco-router/</loc><lastmod>2020-10-10T21:41:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/09/27/how-to-configure-basic-telephony-on-a-brand-new-cisco-call-manager-express-cme/</loc><lastmod>2020-10-10T21:40:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/01/309/</loc><lastmod>2020-10-10T21:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-1/</loc><lastmod>2020-10-10T21:34:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-2/</loc><lastmod>2020-10-10T21:34:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-3/</loc><lastmod>2020-10-10T21:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-9/</loc><lastmod>2020-10-10T21:33:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-6/</loc><lastmod>2020-10-10T21:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-7/</loc><lastmod>2020-10-10T21:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-8/</loc><lastmod>2020-10-10T21:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-10/</loc><lastmod>2020-10-10T21:29:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/03/ccna-voice-summary-part-11/</loc><lastmod>2020-10-10T21:28:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/10/09/ccna-voice-summary-part-12/</loc><lastmod>2020-10-10T21:27:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/22/aruba-620-controller-factory-reset/</loc><lastmod>2020-10-10T21:26:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/21/aruba-620-controller-password-recovery/</loc><lastmod>2020-10-10T21:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/20/jncia-summary-notes-day-2/</loc><lastmod>2020-10-10T21:24:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/20/citrix-netscaler-10-summary-notes-day-1-and-2/</loc><lastmod>2020-10-10T21:21:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/12/factory-reset-process-on-palo-alto/</loc><lastmod>2021-01-04T13:34:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/12/upgrading-palo-alto-software-to-5-0-6/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/07/2013_07_12_19_03_17_greenshot.png</image:loc><image:title>2013_07_12_19_03_17_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/07/2013_07_12_18_33_25_greenshot.png</image:loc><image:title>2013_07_12_18_33_25_Greenshot</image:title></image:image><lastmod>2020-10-10T21:20:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/15/954/</loc><lastmod>2020-10-10T21:18:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/15/uploading-icx-10-gb-ports-on-demand-licence/</loc><lastmod>2020-10-10T21:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/15/junos-installation-on-gns3-part-2-freebsd-installation/</loc><lastmod>2020-10-10T21:13:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/15/junos-installation-on-gns3-part-3-setting-gns3-up-for-virtualbox/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/08/2013_08_15_17_19_21_greenshot.png</image:loc><image:title>2013_08_15_17_19_21_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/08/2013_08_15_17_06_58_greenshot.png</image:loc><image:title>2013_08_15_17_06_58_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/08/2013_08_15_17_03_23_greenshot.png</image:loc><image:title>2013_08_15_17_03_23_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/08/2013_08_15_17_01_07_greenshot.png</image:loc><image:title>2013_08_15_17_01_07_Greenshot</image:title></image:image><lastmod>2020-10-10T21:09:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/19/jncia-summary-notes-day-1/</loc><lastmod>2020-10-10T21:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/20/ccda-640-864-summary-notes-day-1-and-2/</loc><lastmod>2020-10-10T21:08:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/12/10/how-to-block-or-limit-the-use-of-bittorrent-and-p2p-using-nbar-on-cisco-router/</loc><lastmod>2020-10-10T21:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/12/12/how-to-configure-static-ip-address-via-dhcp-example-cisco-ap/</loc><lastmod>2020-10-10T21:06:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/12/20/how-to-configure-a-cisco-router-to-connect-to-cisco-vpn-client-in-a-nat-environment/</loc><lastmod>2020-10-10T21:05:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/03/27/differences-between-cisco-site-to-site-vpn-technologies/</loc><lastmod>2020-10-10T21:05:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/04/05/how-to-activate-an-evaluation-license-for-cisco-router-isr-g2-example-data-feature/</loc><lastmod>2020-10-10T21:03:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/05/16/osi-summary/</loc><lastmod>2020-10-10T20:03:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/05/16/sflow/</loc><lastmod>2020-10-10T20:03:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/05/17/ieee-802-1q/</loc><lastmod>2020-10-10T20:03:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/05/17/ieee-802-3af-poe-and-ieee-802-3at-poe/</loc><lastmod>2020-10-10T20:02:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/09/how-to-check-sfp-connected-to-brocade-icx-6610-switch/</loc><lastmod>2020-10-10T20:00:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/09/boot-brocade-switch-as-a-layer-3-device-from-secondary-flash/</loc><lastmod>2021-09-26T13:11:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/07/12/palo-alto-update-server-down-wtf/</loc><lastmod>2020-10-10T10:52:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/23/day-out-with-aruba-controller-620-initial-configuration-part-1/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/08/2013_08_24_10_05_59_greenshot.png</image:loc><image:title>2013_08_24_10_05_59_Greenshot</image:title></image:image><lastmod>2020-10-10T10:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/08/23/aruba-3200xm-initial-configuration-part-1/</loc><lastmod>2020-10-10T10:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/02/summary-notes-junos-as-a-second-language/</loc><lastmod>2020-10-10T10:46:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/04/ccda-640-864-summary-notes-day-3/</loc><lastmod>2020-10-10T09:35:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/04/aruba620-ssid-prunning-on-a-specific-ap/</loc><lastmod>2020-10-10T09:34:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/09/ccda-640-864-summary-notes-day-4/</loc><lastmod>2020-10-10T09:33:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/10/ccda-640-864-summary-notes-day-5/</loc><lastmod>2020-10-09T23:29:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/13/ccda-640-864-summary-notes-day-6/</loc><lastmod>2020-10-09T23:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/13/ccda-640-864-summary-notes-chapter-4-day-7/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_11_25_10_greenshot1.jpg</image:loc><image:title>2013_09_13_11_25_10_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_11_25_10_greenshot.jpg</image:loc><image:title>2013_09_13_11_25_10_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_11_25_10_greenshot.png</image:loc><image:title>2013_09_13_11_25_10_Greenshot</image:title></image:image><lastmod>2020-10-09T23:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/13/citrix-netscaler-10-summary-notes-getting-started-day-3/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_17_55_24_greenshot.png</image:loc><image:title>2013_09_13_17_55_24_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_17_43_10_greenshot.png</image:loc><image:title>2013_09_13_17_43_10_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_16_58_19_greenshot.png</image:loc><image:title>2013_09_13_16_58_19_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_13_13_18_21_greenshot.png</image:loc><image:title>2013_09_13_13_18_21_Greenshot</image:title></image:image><lastmod>2020-10-09T23:27:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/16/ccda-640-864-summary-notes-chapter-4-day-8/</loc><lastmod>2020-10-09T23:27:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/16/citrix-netscaler-10-summary-notes-getting-started-day-4/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/pic2.png</image:loc><image:title>pic2</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/pic12.png</image:loc><image:title>pic1</image:title></image:image><lastmod>2020-10-09T23:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/17/citrix-netscaler-10-summary-notes-getting-started-day-5/</loc><lastmod>2020-10-09T23:21:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/18/ccda-640-864-summary-notes-chapter-5-day-10/</loc><lastmod>2020-10-09T23:21:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/18/citrix-netscaler-10-summary-notes-getting-started-day-6/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_18_13_37_29_greenshot.png</image:loc><image:title>2013_09_18_13_37_29_Greenshot</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/2013_09_18_13_23_59_greenshot.png</image:loc><image:title>2013_09_18_13_23_59_Greenshot</image:title></image:image><lastmod>2020-10-09T23:20:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/19/ccda-640-864-summary-notes-chapter-5-day-11/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2013/09/untitled.png</image:loc><image:title>Untitled</image:title></image:image><lastmod>2020-10-09T23:17:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/23/ccda-640-864-summary-notes-chapter-6-day-13/</loc><lastmod>2020-10-09T23:06:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/09/27/2268/</loc><lastmod>2020-10-09T23:05:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/10/24/wireless-lan-controller-field-upgrade-to-1-7-0-0-fus-via-cli/</loc><lastmod>2020-10-09T23:00:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/10/24/cisco-5508-wireless-lan-controller-firmware-upgrade-via-cli/</loc><lastmod>2020-10-09T22:51:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/11/01/reset-cisco-wlc-5508-to-factory-settings/</loc><lastmod>2020-10-09T22:47:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2013/11/01/cisco-5508-wireless-lan-controller-enable-web-access-from-gui/</loc><lastmod>2020-10-09T22:45:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/01/18/ccna-wireless-summary-part-1/</loc><lastmod>2020-10-09T22:44:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/01/18/cisco-wlc-application-visibility-and-control/</loc><lastmod>2020-10-09T22:43:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/03/05/cisco-5508-wireless-lan-controller-software-image-upgrade-to-7-0-250-0-via-web/</loc><lastmod>2020-10-09T22:43:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/16/ccna-wireless-summary-notes-dealing-with-wireless-interference/</loc><lastmod>2020-10-09T22:42:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/17/ccna-wireless-summary-notes-managing-wireless-networks-with-wireless-control-system-wcs-sneakpeak-into-cisco-prime-interface/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_17_12_20_18_cisco_prime_infrastructure_monitor_maps_area_view_172-20-74-187.png</image:loc><image:title>2014_06_17_12_20_18_Cisco_Prime_Infrastructure_Monitor_Maps_Area_View_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_17_12_17_36_cisco_prime_infrastructure_monitor_maps_area_view_172-20-74-187.png</image:loc><image:title>2014_06_17_12_17_36_Cisco_Prime_Infrastructure_Monitor_Maps_Area_View_172.20.74.187</image:title></image:image><lastmod>2020-10-09T22:41:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/17/patching-cisco-acs-5-4/</loc><lastmod>2020-10-09T22:39:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/18/cisco-acs-5-4-importing-user-file-using-csv/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_14_12_26_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_14_12_26_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_14_10_21_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_14_10_21_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_14_08_56_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_14_08_56_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_58_26_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_13_58_26_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_55_48_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_13_55_48_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_54_23_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_13_54_23_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_52_48_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_13_52_48_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_47_22_program_manager.png</image:loc><image:title>2014_06_18_13_47_22_Program_Manager</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_45_51_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_13_45_51_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_18_13_44_45_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_06_18_13_44_45_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><lastmod>2020-10-09T22:38:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/27/ccna-wireless-summary-notes-configuring-a-wlan/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_27_17_06_51_nmdcbpwlc100.png</image:loc><image:title>2014_06_27_17_06_51_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_27_12_45_12_10-44-20-50_remote_desktop_connection.png</image:loc><image:title>2014_06_27_12_45_12_10.44.20.50_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/06/2014_06_27_12_22_06_10-44-20-50_remote_desktop_connection.png</image:loc><image:title>2014_06_27_12_22_06_10.44.20.50_Remote_Desktop_Connection</image:title></image:image><lastmod>2020-10-09T22:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/30/ccdp-arch-summary-notes-1/</loc><lastmod>2020-10-09T22:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/06/30/ccna-wireless-summary-notes-implementing-a-wireless-guest-network/</loc><lastmod>2020-10-09T22:35:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/03/installation-of-cisco-prime-v2-0-secondary-server/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_16_20_51_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_16_20_51_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_16_20_28_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_16_20_28_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_16_10_42_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_16_10_42_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_16_09_33_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_16_09_33_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_16_06_04_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_16_06_04_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_16_03_42_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_16_03_42_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_15_59_18_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_15_59_18_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_15_56_47_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_15_56_47_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_15_56_23_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_15_56_23_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_15_30_45_wldcbpinf02-mkcorp-com_remote_desktop_connection1.png</image:loc><image:title>2014_07_03_15_30_45_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><lastmod>2020-10-09T22:35:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/04/cisco-prime-configuring-ha/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_10_46_22_10-44-6-200_putty.png</image:loc><image:title>2014_07_04_10_46_22_10.44.6.200_PuTTY</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_10_45_31_10-44-6-200_putty.png</image:loc><image:title>2014_07_04_10_45_31_10.44.6.200_PuTTY</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_10_39_05_172-20-74-187_putty.png</image:loc><image:title>2014_07_04_10_39_05_172.20.74.187_PuTTY</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_10_37_59_10-44-6-200_putty.png</image:loc><image:title>2014_07_04_10_37_59_10.44.6.200_PuTTY</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_10_32_52_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_10_32_52_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_18_01_03_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_03_18_01_03_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_17_57_31_cisco_prime_infrastructure_ha_configuration_172-20-74-187.png</image:loc><image:title>2014_07_03_17_57_31_Cisco_Prime_Infrastructure_HA_Configuration_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_17_44_10_cisco_prime_infrastructure_ha_configuration_172-20-74-187.png</image:loc><image:title>2014_07_03_17_44_10_Cisco_Prime_Infrastructure_HA_Configuration_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_17_42_35_cisco_prime_infrastructure_mail_server_configuration_172-20-74-187.png</image:loc><image:title>2014_07_03_17_42_35_Cisco_Prime_Infrastructure_Mail_Server_Configuration_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_03_17_38_35_cisco_prime_infrastructure_mail_server_configuration_172-20-74-187.png</image:loc><image:title>2014_07_03_17_38_35_Cisco_Prime_Infrastructure_Mail_Server_Configuration_172.20.74.187</image:title></image:image><lastmod>2020-10-09T22:28:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/04/cisco-prime-installation-of-cisco-prime-v2-0-standalone/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_18_17_56_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_18_17_56_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_18_11_10_10-44-6-200_putty.png</image:loc><image:title>2014_07_04_18_11_10_10.44.6.200_PuTTY</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_18_08_42_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_18_08_42_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_18_00_06_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_18_00_06_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_17_46_52_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_17_46_52_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_17_35_45_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_17_35_45_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_17_29_32_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_17_29_32_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_17_28_06_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_17_28_06_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_04_17_20_57_wldcbpinf02-mkcorp-com_remote_desktop_connection.png</image:loc><image:title>2014_07_04_17_20_57_wldcbpinf02.mkcorp.com_Remote_Desktop_Connection</image:title></image:image><lastmod>2020-10-09T22:25:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/07/ccna-wireless-summary-notes-wireless-security-fundamentals-part-1/</loc><lastmod>2020-10-09T22:25:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/08/cisco-prime-installation-of-cisco-prime-v2-0-adding-a-licence/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_21_31_cisco_prime_infrastructure_licenses_10-44-6-200.png</image:loc><image:title>2014_07_08_15_21_31_Cisco_Prime_Infrastructure_Licenses_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_16_38_license_administration_portal.png</image:loc><image:title>2014_07_08_15_16_38_License_Administration_Portal</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_15_13_license_administration_portal.png</image:loc><image:title>2014_07_08_15_15_13_License_Administration_Portal</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_14_05_cisco_prime_infrastructure_licenses_10-44-6-200.png</image:loc><image:title>2014_07_08_15_14_05_Cisco_Prime_Infrastructure_Licenses_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_12_15_license_administration_portal.png</image:loc><image:title>2014_07_08_15_12_15_License_Administration_Portal</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_09_52_license_administration_portal.png</image:loc><image:title>2014_07_08_15_09_52_License_Administration_Portal</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_08_15_07_03_license_administration_portal.png</image:loc><image:title>2014_07_08_15_07_03_License_Administration_Portal</image:title></image:image><lastmod>2020-10-09T22:24:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/09/ccna-wireless-summary-notes-wireless-security-fundamentals-part-2/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_09_10_25_47_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_09_10_25_47_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T22:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/14/ccna-wireless-summary-notes-understanding-radio-resource-management-rrm/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_13_12_09_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_13_12_09_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_13_04_27_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_13_04_27_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_13_00_14_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_13_00_14_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_12_19_26_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_12_19_26_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_12_14_07_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_14_12_14_07_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_12_06_07_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_12_06_07_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_11_50_06_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_11_50_06_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_11_28_38_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_11_28_38_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_11_27_42_nmdcbpwlc100.png</image:loc><image:title>2014_07_14_11_27_42_NMDCBPWLC100</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_14_11_26_46_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_14_11_26_46_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T22:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/17/ccna-wireless-summary-notes-understanding-roaming/</loc><lastmod>2020-10-09T22:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/21/ccna-wireless-summary-notes-understanding-controller-discovery/</loc><lastmod>2020-10-09T22:18:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/24/ccna-wireless-summary-notes-initial-controller-configuration/</loc><lastmod>2020-10-09T22:18:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/25/ccna-wireless-summary-notes-understanding-the-cuwn-architecture/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_25_19_23_36_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_25_19_23_36_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_25_19_23_21_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_25_19_23_21_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_25_19_18_03_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_25_19_18_03_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_25_19_16_10_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_25_19_16_10_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T22:18:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/26/ccna-wireless-summary-notes-understanding-autonomous-aps/</loc><lastmod>2020-10-09T20:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/28/ccna-wireless-summary-notes-planning-coverage-with-wireless-aps/</loc><lastmod>2020-10-09T20:08:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/07/28/ccna-wireless-summary-notes-understanding-802-11-frame-types/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_28_12_36_30_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_28_12_36_30_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/07/2014_07_28_11_46_52_ccna_wireless_640_722_official_cert_guide_secured_adobe_reader.png</image:loc><image:title>2014_07_28_11_46_52_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T20:07:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/08/28/cisco-wlc-customized-webauth-files/</loc><lastmod>2020-10-09T20:06:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/09/18/cisco-wireless-troubleshooting-lightweight-ap-connectivity-issues/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_09_18_10_53_43_nldcbpwlc01.png</image:loc><image:title>2014_09_18_10_53_43_NLDCBPWLC01</image:title></image:image><lastmod>2020-10-09T20:05:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/13/cwna-summary-notes-what-is-a-site-survey/</loc><lastmod>2020-10-09T20:04:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/14/cisco-wireless-upgrading-cisco-prime-infrastructure-cpi-2-0-to-2-1/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_15_12_21_23_10-44-6-200_securecrt.png</image:loc><image:title>2014_10_15_12_21_23_10.44.6.200_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_23_26_cisco_prime_infrastructure_device_workcenter_10-44-6-200.png</image:loc><image:title>2014_10_14_19_23_26_CISCO_Prime_Infrastructure_Device_Workcenter_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_16_47_cisco_prime_infrastructure_configure_controllers_10-44-6-200.png</image:loc><image:title>2014_10_14_19_16_47_Cisco_Prime_Infrastructure_Configure_Controllers_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_16_34_cisco_prime_infrastructure_configure_controllers_10-44-6-200.png</image:loc><image:title>2014_10_14_19_16_34_Cisco_Prime_Infrastructure_Configure_Controllers_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_17_41_cisco_prime_infrastructure_configure_controllers_10-44-6-200.png</image:loc><image:title>2014_10_14_19_17_41_Cisco_Prime_Infrastructure_Configure_Controllers_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_18_11_cisco_prime_infrastructure_configure_controllers_10-44-6-200.png</image:loc><image:title>2014_10_14_19_18_11_Cisco_Prime_Infrastructure_Configure_Controllers_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_10_51_cisco_prime_infrastructure_login_10-44-6-200.png</image:loc><image:title>2014_10_14_19_10_51_Cisco_Prime_Infrastructure_Login_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_09_18_10-44-6-200_securecrt1.png</image:loc><image:title>2014_10_14_19_09_18_10.44.6.200_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_19_09_18_10-44-6-200_securecrt.png</image:loc><image:title>2014_10_14_19_09_18_10.44.6.200_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_14_18_39_18_10-44-6-200_securecrt.png</image:loc><image:title>2014_10_14_18_39_18_10.44.6.200_SecureCRT</image:title></image:image><lastmod>2020-10-09T20:01:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/15/cwna-summary-notes-specialized-site-survey-tools/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_15_11_49_42_1133132170_wirele-pdf_adobe_reader.png</image:loc><image:title>2014_10_15_11_49_42_1133132170_Wirele.pdf_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T20:00:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/16/cwna-summary-notes-procedures-for-performing-a-site-survey/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_16_13_49_17_1133132170_wirele-pdf_adobe_reader.png</image:loc><image:title>2014_10_16_13_49_17_1133132170_Wirele.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_16_12_17_42_1133132170_wirele-pdf_adobe_reader.png</image:loc><image:title>2014_10_16_12_17_42_1133132170_Wirele.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_16_12_18_52_1133132170_wirele-pdf_adobe_reader.png</image:loc><image:title>2014_10_16_12_18_52_1133132170_Wirele.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_16_12_10_04_1133132170_wirele-pdf_adobe_reader.png</image:loc><image:title>2014_10_16_12_10_04_1133132170_Wirele.pdf_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T19:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/17/cwna-summary-notes-capacity-and-coverage-requirements/</loc><lastmod>2020-10-09T19:59:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/20/cwna-summary-notes-vertical-market-considerations/</loc><lastmod>2020-10-09T19:58:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/10/09/cisco-wireless-webauth-on-wlc/</loc><lastmod>2020-10-09T19:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/23/cwna-summary-notes-spectrum-and-coverage-analysis/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_20_09_33_44_ebook-pdf_adobe_reader.png</image:loc><image:title>2014_10_20_09_33_44_ebook.pdf_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T19:57:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/23/cwna-summary-notes-site-survey-tools/</loc><lastmod>2020-10-09T19:57:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/23/cwna-summary-notes-coverage-analysis-methods/</loc><lastmod>2020-10-09T19:57:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/24/cisco-wireless-upgrading-mse-from-v7-5-to-v8-0-via-cisco-prime/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_13_00_27_dashboard.png</image:loc><image:title>2014_10_24_13_00_27_Dashboard</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_50_01_cisco_prime_infrastructure_all_servers_172-20-74-1871.png</image:loc><image:title>2014_10_24_12_50_01_Cisco_Prime_Infrastructure_All_Servers_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_44_43_backup1.png</image:loc><image:title>2014_10_24_12_44_43_Backup</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_50_01_cisco_prime_infrastructure_all_servers_172-20-74-187.png</image:loc><image:title>2014_10_24_12_50_01_Cisco_Prime_Infrastructure_All_Servers_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_44_43_backup.png</image:loc><image:title>2014_10_24_12_44_43_Backup</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_43_15_backup.png</image:loc><image:title>2014_10_24_12_43_15_Backup</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_42_01_backup.png</image:loc><image:title>2014_10_24_12_42_01_Backup</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_41_09_backup.png</image:loc><image:title>2014_10_24_12_41_09_Backup</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_12_37_03_backup.png</image:loc><image:title>2014_10_24_12_37_03_Backup</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_23_23_04_32_mse_nmdcbpmse100_172-20-74-188_securecrt.png</image:loc><image:title>2014_10_23_23_04_32_MSE_NMDCBPMSE100_172.20.74.188_SecureCRT</image:title></image:image><lastmod>2020-10-09T19:57:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/24/cisco-wireless-mse-patch-for-bash-code-injection-vulnerability-aka-shellshock-cve-2014-6271-cve-2014-7169/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_15_19_18_cisco_prime_infrastructure_all_servers_172-20-74-187.png</image:loc><image:title>2014_10_24_15_19_18_Cisco_Prime_Infrastructure_All_Servers_172.20.74.187</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_15_14_10_mse_nmdcbpmse100_172-20-74-188_securecrt.png</image:loc><image:title>2014_10_24_15_14_10_MSE_NMDCBPMSE100_172.20.74.188_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_15_09_19_mse_nmdcbpmse100_172-20-74-188_securecrt.png</image:loc><image:title>2014_10_24_15_09_19_MSE_NMDCBPMSE100_172.20.74.188_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_15_06_24_mse_nmdcbpmse100_172-20-74-188_securecrt.png</image:loc><image:title>2014_10_24_15_06_24_MSE_NMDCBPMSE100_172.20.74.188_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_15_04_07_mse_nmdcbpmse100_172-20-74-188_securecrt.png</image:loc><image:title>2014_10_24_15_04_07_MSE_NMDCBPMSE100_172.20.74.188_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_15_01_18_mse_8-0_upgrade_mrn_cciew.png</image:loc><image:title>2014_10_24_15_01_18_MSE_8.0_Upgrade_mrn_cciew</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_14_34_14_8_0_100_0_mse_bash_patch.png</image:loc><image:title>2014_10_24_14_34_14_8_0_100_0_mse_bash_patch</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_13_43_25_mse_nmdcbpmse100_172-20-74-188_securecrt.png</image:loc><image:title>2014_10_24_13_43_25_MSE_NMDCBPMSE100_172.20.74.188_SecureCRT</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_24_13_37_52_cisco_systems.png</image:loc><image:title>2014_10_24_13_37_52_Cisco_Systems</image:title></image:image><lastmod>2020-10-09T19:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/28/cisco-prime-unit-of-measurement-for-maps-meters-and-feet/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_28_19_06_10_cisco_prime_infrastructure_monitor_maps_search_result_10-44-6-200.png</image:loc><image:title>2014_10_28_19_06_10_Cisco_Prime_Infrastructure_Monitor_Maps_Search_Result_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_28_19_03_55_cisco_prime_infrastructure_monitor_maps_search_result_10-44-6-200.png</image:loc><image:title>2014_10_28_19_03_55_Cisco_Prime_Infrastructure_Monitor_Maps_Search_Result_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_28_19_02_47_cisco_prime_infrastructure_my_dashboard_10-44-6-200.png</image:loc><image:title>2014_10_28_19_02_47_Cisco_Prime_Infrastructure_My_Dashboard_10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_28_19_01_50_cisco_prime_infrastructure_monitor_maps_search_result_10-44-6-200.png</image:loc><image:title>2014_10_28_19_01_50_Cisco_Prime_Infrastructure_Monitor_Maps_Search_Result_10.44.6.200</image:title></image:image><lastmod>2020-10-09T19:54:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/10/30/ccnp-wireless-cuwss-642-732-summary-notes-1-identifying-site-survey-requirements-for-different-vertical-industries/</loc><lastmod>2020-10-09T19:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/02/ccnp-wireless-cuwss-642-732-summary-notes-2-site-survey-preassessment/</loc><lastmod>2020-10-09T19:53:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/03/ccnp-wireless-cuwss-642-732-summary-notes-3-rf-applications-and-client-devices/</loc><lastmod>2020-10-09T19:52:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/04/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-2-802-11n-hardware/</loc><lastmod>2020-10-09T19:52:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/04/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-regulatory-issues/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014-11-05-08_15_35-cuwss-v1-0-student-guide_vol1-pdf-adobe-reader.png</image:loc><image:title>2014-11-05 08_15_35-CUWSS v1.0 Student Guide_Vol1.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014-11-05-07_54_37-cuwss-v1-0-student-guide_vol1-pdf-adobe-reader.png</image:loc><image:title>2014-11-05 07_54_37-CUWSS v1.0 Student Guide_Vol1.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_10_31_11_27_10_cuwss_v1-0_student_guide_vol1-pdf_adobe_reader.png</image:loc><image:title>2014_10_31_11_27_10_CUWSS_v1.0_Student_Guide_Vol1.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_10_31_11_25_03_cuwss_v1-0_student_guide_vol1-pdf_adobe_reader.png</image:loc><image:title>2014_10_31_11_25_03_CUWSS_v1.0_Student_Guide_Vol1.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_10_31_11_22_19_cuwss_v1-0_student_guide_vol1-pdf_adobe_reader.png</image:loc><image:title>2014_10_31_11_22_19_CUWSS_v1.0_Student_Guide_Vol1.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_09_02_18_29_25_windows_media_player.png</image:loc><image:title>2014_09_02_18_29_25_Windows_Media_Player</image:title></image:image><lastmod>2020-10-09T19:52:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/05/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-safety-and-aesthetics-considerations/</loc><lastmod>2020-10-09T19:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/11/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-site-survey-information/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-11-19_03_00-cuwss-v1-0-student-guide_vol1-pdf-adobe-reader.png</image:loc><image:title>2014-11-11 19_03_00-CUWSS v1.0 Student Guide_Vol1.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_11_17_58_47_nldcbpwlc01.png</image:loc><image:title>2014_11_11_17_58_47_NLDCBPWLC01</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_10_27_08_17_05_cuwss_v1-0_student_guide_vol1-pdf_adobe_reader.png</image:loc><image:title>2014_10_27_08_17_05_CUWSS_v1.0_Student_Guide_Vol1.pdf_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T19:51:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/13/ccnp-wireless-cuwss-642-732-summary-notes-9-mesh-networks/</loc><lastmod>2020-10-09T19:51:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/13/ccnp-wireless-cuwss-642-732-summary-notes-chapter-4-designing-a-mesh-network/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_03_12_51_42_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_10_03_12_51_42_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_03_12_48_36_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_10_03_12_48_36_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_03_12_30_28_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_10_03_12_30_28_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_03_10_49_40_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_10_03_10_49_40_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T19:50:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/14/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-3-estimating-the-number-of-aps-1/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-18-07_07_08-cisco-pi-planning-mode-maps-view-10-44-6-200.png</image:loc><image:title>2014-11-18 07_07_08-Cisco PI - Planning Mode Maps View - 10.44.6.200</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-18-07_04_56-cisco-pi-planning-mode-maps-view-10-44-6-200.png</image:loc><image:title>2014-11-18 07_04_56-Cisco PI - Planning Mode Maps View - 10.44.6.200</image:title></image:image><lastmod>2020-10-09T19:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/21/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-2-planning-for-site-survey/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/09/2014_09_03_11_18_42_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_09_03_11_18_42_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T19:50:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/21/ccnp-wireless-cuwss-642-732-summary-notes-13-defining-site-survey-documentation/</loc><lastmod>2020-10-09T19:49:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/23/ccnp-wireless-cuwss-642-732-summary-notes-11-active-site-survey/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-17_18_43-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 17_18_43-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-17_15_31-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 17_15_31-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-17_14_24-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 17_14_24-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014-11-23-17_13_47-cuwss-v1-0-student-guide_vol2-pdf-adobe-reader.png</image:loc><image:title>2014-11-23 17_13_47-CUWSS v1.0 Student Guide_Vol2.pdf - Adobe Reader</image:title></image:image><lastmod>2020-10-09T19:49:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/28/ccnp-wireless-cuwss-642-732-summary-notes-15-layer-2-active-site-survey-using-airmagnet-survey-pro/</loc><lastmod>2020-10-09T19:48:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/28/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-3-ekahau-site-survey/</loc><lastmod>2020-10-09T19:48:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/29/ccnp-wireless-cuwss-642-732-summary-notes-designing-the-rf-network/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014-11-11-17_21_46-cuwss-v1-0-student-guide_vol1-pdf-adobe-reader.png</image:loc><image:title>2014-11-11 17_21_46-CUWSS v1.0 Student Guide_Vol1.pdf - Adobe Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-10-09T19:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/29/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-4-determine-the-infrastructure-requirements/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_30_21_14_56_cuwss_v1-0_student_guide_vol1-pdf_adobe_reader.png</image:loc><image:title>2014_10_30_21_14_56_CUWSS_v1.0_Student_Guide_Vol1.pdf_Adobe_Reader</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_02_09_02_03_nldcbpwlc01.png</image:loc><image:title>2014_10_02_09_02_03_NLDCBPWLC01</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/10/2014_10_02_08_54_33_9780133096491-pdf_secured_adobe_reader.png</image:loc><image:title>2014_10_02_08_54_33_9780133096491.pdf_SECURED_Adobe_Reader</image:title></image:image><lastmod>2020-10-09T19:47:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/29/ccnp-wireless-part-1-conducting-cisco-unified-wireless-site-survey-cuwss-642-732-summary-notes-chapter-2-choosing-antennas/</loc><lastmod>2020-10-09T19:47:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/30/ccnp-wireless-cuwss-642-732-summary-notes-chapter-4-infrastructure-requirements/</loc><lastmod>2020-10-09T19:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/11/30/ccnp-wireless-cuwss-642-732-summary-notes-assessing-rf-coverage/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2014/11/2014_11_30_22_56_46_nldcbpwlc01.png</image:loc><image:title>2014_11_30_22_56_46_NLDCBPWLC01</image:title></image:image><lastmod>2020-10-09T19:46:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/12/01/ccnp-wireless-cuwss-642-732-summary-notes-assessing-wlan-readiness/</loc><lastmod>2020-10-09T19:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2014/12/01/ccnp-wireless-cuwss-642-732-summary-notes-installation-report/</loc><lastmod>2020-10-09T19:45:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/16/ccnp-wireless-642-747-iuwms-summary-notes-2-location-tracking-techniques-cell-of-origin/</loc><lastmod>2020-10-09T19:44:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/19/ccnp-wireless-642-747-iuwms-summary-notes-3-location-tracking-techniques-lateration-rss/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/02/2015-02-06-22_19_53-document1-word.png</image:loc><image:title>2015-02-06 22_19_53-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/02/2015-02-06-21_49_10-document1-word.png</image:loc><image:title>2015-02-06 21_49_10-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/02/2015-02-06-21_07_42-document1-word.png</image:loc><image:title>2015-02-06 21_07_42-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/02/2015-02-06-19_50_02-document1-word.png</image:loc><image:title>2015-02-06 19_50_02-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/02/2015-02-06-19_43_45-document1-word.png</image:loc><image:title>2015-02-06 19_43_45-Document1 - Word</image:title></image:image><lastmod>2020-10-09T19:43:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/22/ccnp-wireless-642-747-iuwms-summary-notes-5-location-tracking-techniques-angulation-aoa-doa/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/untitled2.png</image:loc><image:title>Untitled</image:title></image:image><lastmod>2020-10-09T19:43:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/07/01/half-way-through-2015/</loc><lastmod>2020-10-09T19:40:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/07/01/july-2015-study-plan/</loc><lastmod>2020-10-09T19:39:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/01/02/new-year-new-things/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2020/01/2020_01_10_13_52_45_new_year_new_things.png</image:loc><image:title>2020_01_10_13_52_45_New_Year_New_Things</image:title></image:image><lastmod>2020-10-09T19:39:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/01/25/passed-the-aws-certified-solutions-architect-associate-saa-c01-exam/</loc><lastmod>2020-10-09T19:37:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/04/04/book-review-summary-the-cuckoos-egg/</loc><lastmod>2020-10-04T13:42:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/05/22/attributes-used-by-bgp-in-route-selection/</loc><lastmod>2020-10-03T14:52:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2012/05/22/verification-commands-for-bgp/</loc><lastmod>2020-10-03T14:51:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/16/ccnp-wireless-642-747-iuwms-summary-notes-1-introduction-to-location-based-services/</loc><lastmod>2020-10-03T14:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/16/ccnp-wireless-642-747-iuwms-summary-notes-2-location-tracking-techniques-lateration/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/untitled1.png</image:loc><image:title>Untitled</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-18_05_03-document1-word.png</image:loc><image:title>2015-02-06 18_05_03-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-18_02_24-document1-word.png</image:loc><image:title>2015-02-06 18_02_24-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-18_01_19-document1-word.png</image:loc><image:title>2015-02-06 18_01_19-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-18_00_15-document1-word.png</image:loc><image:title>2015-02-06 18_00_15-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-17_56_41-document1-word.png</image:loc><image:title>2015-02-06 17_56_41-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-16_10_16-document1-word-e1423228293836.png</image:loc><image:title>2015-02-06 16_10_16-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-02-06-16_07_34-document1-word.png</image:loc><image:title>2015-02-06 16_07_34-Document1 - Word</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/untitled.png</image:loc><image:title>Untitled</image:title></image:image><lastmod>2020-10-03T14:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/01/22/ccnp-wireless-642-747-iuwms-summary-notes-6-location-tracking-techniques-pattern-recognition/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/01/2015-03-04-00_25_06-untitled-paint.png</image:loc><image:title>2015-03-04 00_25_06-Untitled - Paint</image:title></image:image><lastmod>2020-10-03T14:21:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/01/june-update/</loc><lastmod>2020-10-03T14:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/09/cwna-summary-notes-802-11-network-security-architecture/</loc><lastmod>2020-10-03T14:17:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/10/cwna-summary-notes-legacy-802-11-security-part-1/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_22_45_43_241_8-828692700_asustekc_6d_f4_c8_intelcor_6b_43_36_802-11_197_association_respo.png</image:loc><image:title>2015_06_22_22_45_43_241_8.828692700_AsustekC_6d_f4_c8_IntelCor_6b_43_36_802.11_197_Association_Respo</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_22_42_04_241_8-828692700_asustekc_6d_f4_c8_intelcor_6b_43_36_802-11_197_association_respo.png</image:loc><image:title>2015_06_22_22_42_04_241_8.828692700_AsustekC_6d_f4_c8_IntelCor_6b_43_36_802.11_197_Association_Respo</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_22_32_04_239_8-826824000_intelcor_6b_43_36_asustekc_6d_f4_c8_802-11_141_association_reque.png</image:loc><image:title>2015_06_22_22_32_04_239_8.826824000_IntelCor_6b_43_36_AsustekC_6d_f4_c8_802.11_141_Association_Reque</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_22_23_29_239_8-826824000_intelcor_6b_43_36_asustekc_6d_f4_c8_802-11_141_association_reque.png</image:loc><image:title>2015_06_22_22_23_29_239_8.826824000_IntelCor_6b_43_36_AsustekC_6d_f4_c8_802.11_141_Association_Reque</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_22_17_46_239_8-826824000_intelcor_6b_43_36_asustekc_6d_f4_c8_802-11_141_association_reque.png</image:loc><image:title>2015_06_22_22_17_46_239_8.826824000_IntelCor_6b_43_36_AsustekC_6d_f4_c8_802.11_141_Association_Reque</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_21_48_54_236_8-816795100_asustekc_6d_f4_c8_intelcor_6b_43_36_802-11_77_authentication_sn.png</image:loc><image:title>2015_06_22_21_48_54_236_8.816795100_AsustekC_6d_f4_c8_IntelCor_6b_43_36_802.11_77_Authentication_SN</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_21_31_05_234_8-815873000_intelcor_6b_43_36_asustekc_6d_f4_c8_802-11_66_authentication_sn.png</image:loc><image:title>2015_06_22_21_31_05_234_8.815873000_IntelCor_6b_43_36_AsustekC_6d_f4_c8_802.11_66_Authentication_SN</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015_06_22_21_25_59_open_system_fromubuntu-cap_wireshark_1-12-5_v1-12-5_0_g5819e5b_from_master_.png</image:loc><image:title>2015_06_22_21_25_59_Open_System_fromUbuntu.cap_Wireshark_1.12.5_v1.12.5_0_g5819e5b_from_master_</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-014739.png</image:loc><image:title>Screenshot from 2015-06-21 01:47:39</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-014537.png</image:loc><image:title>Screenshot from 2015-06-21 01:45:37</image:title></image:image><lastmod>2020-10-03T14:17:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/11/cwna-summary-notes-legacy-802-11-security-part-2/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2020-10-03T14:16:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/12/cwna-summary-notes-legacy-802-11-security-mac-filters/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-011432.png</image:loc><image:title>Screenshot from 2015-06-30 01:14:32</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-011359.png</image:loc><image:title>Screenshot from 2015-06-30 01:13:59</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-011301.png</image:loc><image:title>Screenshot from 2015-06-30 01:13:01</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-011219.png</image:loc><image:title>Screenshot from 2015-06-30 01:12:19</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-0009011.png</image:loc><image:title>Screenshot from 2015-06-30 00:09:01</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/2015-06-30-01_08_22-asus-wireless-router-rt-n66u-wireless-mac-filter.png</image:loc><image:title>2015-06-30 01_08_22-ASUS Wireless Router RT-N66U - Wireless MAC Filter</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-000901.png</image:loc><image:title>Screenshot from 2015-06-30 00:09:01</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-0006031.png</image:loc><image:title>Screenshot from 2015-06-30 00:06:03</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-30-000603.png</image:loc><image:title>Screenshot from 2015-06-30 00:06:03</image:title></image:image><lastmod>2020-10-03T14:15:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/14/june-2015-study-plan/</loc><lastmod>2020-10-03T14:13:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/20/capturing-wlan-packets-using-wireshark/</loc><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-010115.png</image:loc><image:title>Screenshot from 2015-06-21 01:01:15</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-0051451.png</image:loc><image:title>Screenshot from 2015-06-21 00:51:45</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-0039051.png</image:loc><image:title>Screenshot from 2015-06-21 00:39:05</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-0038171.png</image:loc><image:title>Screenshot from 2015-06-21 00:38:17</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-0037561.png</image:loc><image:title>Screenshot from 2015-06-21 00:37:56</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-0029101.png</image:loc><image:title>Screenshot from 2015-06-21 00:29:10</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-005145.png</image:loc><image:title>Screenshot from 2015-06-21 00:51:45</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-003905.png</image:loc><image:title>Screenshot from 2015-06-21 00:39:05</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-003817.png</image:loc><image:title>Screenshot from 2015-06-21 00:38:17</image:title></image:image><image:image><image:loc>https://cybersecfaith.com/wp-content/uploads/2015/06/screenshot-from-2015-06-21-003756.png</image:loc><image:title>Screenshot from 2015-06-21 00:37:56</image:title></image:image><lastmod>2020-10-03T13:59:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/08/04/august-2015-study-plan/</loc><lastmod>2020-10-03T13:51:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2020/09/29/book-review-to-kill-the-president/</loc><lastmod>2020-09-30T08:23:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/useful-links/</loc><lastmod>2015-08-21T09:22:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecfaith.com/2015/06/12/cwnps-cwsp-205-official-study-guide-book-review-part-1/</loc><lastmod>2015-06-29T23:11:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/2015/06/08/ccie-wireless-summary-notes-1-ieee-802-11-primary-mac-layer-functions-part-2/</loc><lastmod>2015-06-12T18:45:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecfaith.com/ccnp-wireless/</loc><lastmod>2014-10-12T17:44:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecfaith.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-02-24T23:12:14+00:00</lastmod></url></urlset>
