<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyberdnevnik.com/journals/entry_1/</loc>
<lastmod>2024-03-14T12:00:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/journals/entry_2/</loc>
<lastmod>2025-02-02T12:00:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/journals/entry_3/</loc>
<lastmod>2025-06-22T12:00:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/cybersecurity-skills-gap/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/endpoint-security-solutions/</loc>
<lastmod>2025-08-06T20:43:35+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/want-to-become-azure-cloud-certified/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/defend-your-azure-environment-with-mdfc/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/crowdStrike-moving-boundaries-and-making-it-worth/</loc>
<lastmod>2025-08-06T20:43:35+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/introduction-to-reverse-engineering/</loc>
<lastmod>2024-03-26T16:00:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/ddos-attacks-on-your-azure-environment/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/why-you-need-microsoft-sentinel/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/inside-pc-health-check-part1/</loc>
<lastmod>2024-06-14T16:00:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/stop-drowning-in-data-tame-your-azure-logs-with-kql/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/inside-pc-health-check-part2/</loc>
<lastmod>2025-05-23T18:29:04+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/global-it-outage/</loc>
<lastmod>2024-07-23T12:00:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/azure-key-vaults-for-newbies-secure-your-secrets-with-ease/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/az900-study-guide-part-1/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/az900-study-guide-part-2/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/az900-study-guide-part-3/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/comptia-security-plus/</loc>
<lastmod>2025-08-23T17:57:19+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/xdr-unified-investigation-and-response-experience/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/process-hollowing/</loc>
<lastmod>2025-05-21T15:54:39+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/unified-security-management/</loc>
<lastmod>2025-09-01T14:04:40+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/microsoft-security-hub/</loc>
<lastmod>2025-09-26T18:27:26+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/posts/unpacking-and-reversing-vipkeylogger/</loc>
<lastmod>2026-01-24T16:51:00+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/about/</loc>
<lastmod>2026-01-26T08:28:03+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/journals/</loc>
<lastmod>2026-01-26T08:28:03+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/</loc>
<lastmod>2026-01-26T08:28:03+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/</loc>
<lastmod>2026-01-26T08:28:03+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/archives/</loc>
<lastmod>2026-01-26T08:28:03+00:00</lastmod>
</url>
<url>
<loc>https://cyberdnevnik.com/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/journals/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/test/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/test/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/red-team/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/blue-team/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/edr-mdr-xdr/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/azure/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/microsoft/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/certificate/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/cloud-security/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/defender-for-cloud/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/cnapp/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/cwpp/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/cspm/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/regulatory-compliance/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/crowdstrike/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/reverse-engineering/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/ddos/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/cloud/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/networking/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/sentinel/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/siem/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/soar/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/kusto-query-language/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/kql/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/bsod/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/key-vault/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/fundamentals/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/az-900/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/study/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/guide/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/comptia/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/xdr/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/unified/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/soc/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/malware-development/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/programming/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/process-injection/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/malware-reversing/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/malware-unpacking/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/stealer/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/tags/vipkeylogger/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/articles/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/endpoint-security/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/cloud-security/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/reverse-engineering/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/certifications/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/categories/malware-development/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/page2/</loc>
</url>
<url>
<loc>https://cyberdnevnik.com/page3/</loc>
</url>
</urlset>
