<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/01-mission-and-structure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/01-mission-and-structure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s00-course-introduction/01-mission-and-structure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/01-the-problem-with-grc-training/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/01-what-this-course-builds/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/01-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/01-soc-operating-models/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/01-grc-triad-operating-system/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/01-tabular-data-model/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/01-what-ai-does/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c10-future-ai-security/01-agentic-ai/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/01-analytics-rules-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/01-automation-strategy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/01-cmmc-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/01-investigation-to-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/01-from-metrics-to-dashboards/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/01-hypothesis-driven-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/01-hunting-concepts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/01-why-traditional-awareness-fails/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/01-workbook-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/01-audit-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/01-threat-intelligence-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/01-understanding-aitm/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k13-capstone-the-hunting-lab/01-scenario-brief/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/01-translating-risk/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/01-bec-mechanics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/01-token-mechanics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/01-regulatory-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/01-oauth-consent/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/01-organizational-design/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/01-financial-services/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/01-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/01-architecture-planning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/01-detection-engineering-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/01-feedback-loop/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/01-policy-hierarchy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/01-where-comparison-operators/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/01-advisory-to-rule/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/01-purview-for-security-ops/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/01-risk-assessment-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/01-signinlogs-deep-dive/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/01-summarize-counting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/01-architecture-concepts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/01-email-data-sources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/01-join-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/01-four-treatment-options/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/01-four-pass-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/01-endpoint-data-sources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/01-generative-ai-for-secops/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/01-kris-and-kpis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/01-deployment-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/01-parse-operator/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/01-policy-drafting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/01-cloud-data-sources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/01-construct-kql-statements/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/01-iso27001-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/01-mv-expand-mv-apply/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/01-csf-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/01-make-series-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/01-sentinel-siem-soar/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/01-playbook-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/01-shadow-ai/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/01-entity-relationships/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/01-ingestion-strategy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/01-soc2-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/01-onboarding/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/01-incident-documentation-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/01-email-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/01-gdpr-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/01-prompt-injection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/01-query-engine-internals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/01-hardening-detection-relationship/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/s1-security-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/01-deploy-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/01-why-identity-is-the-new-perimeter/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/01-anatomy-of-sign-in-log/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/01-workload-identity-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/01-external-identity-trust-boundary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/01-identity-governance-challenge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/01-identity-log-sources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/01-log-routing-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/01-single-points-of-failure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/01-identity-signals-xdr/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/01-architecture-blueprint/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/01-design-challenge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/01-authentication-method-hierarchy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/01-how-evaluation-works/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/01-attack-to-defense-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/01-how-identity-protection-works/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/01-standing-privileges-danger/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/01-token-types-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/01-report-only-mode/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/01-dual-object-model/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/foundation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/01-why-this-course-exists/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/01-forensic-workstation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/01-sharepoint-audit-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/01-entra-audit-log-deep-dive/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/01-incident-queue-triage/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/01-initial-access-reconstruction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/01-account-compromise-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/01-hr-legal-coordination/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/01-supply-chain-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/01-evidence-to-finding/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/01-ir-plan-development/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/01-phase-a-triage/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/01-forensic-soundness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/01-prefetch-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/01-ntfs-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/01-event-log-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/01-memory-acquisition/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/01-credential-theft-lsass-sam/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/01-signin-log-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/01-mailbox-audit-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/01-why-linux-ir-is-different/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/01-uac-triage-tool/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/01-ext4-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/01-logging-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/01-ssh-attack-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/01-web-attack-surface/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/01-escalation-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/01-persistence-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/references/references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/17-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c11-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g17-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k14-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s13-references/01-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/01-detection-coverage-illusion/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/01-hypothesis-generation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/01-lateral-movement-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/01-application-threat-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/01-pre-ransomware-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/01-insider-threat-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/01-hunt-cadence-models/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/01-documentation-standard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/01-scheduled-hunting-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/01-troubleshooting-debugging-kql/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/01-exporting-analytics-rule-inventory/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/01-building-authentication-baseline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/01-cloud-persistence-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/01-privilege-escalation-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/01-email-threat-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/01-data-exfiltration-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/01-endpoint-threat-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/001-midnight-oauth/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/foundation/f1-what-claude-is/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/02-how-ai-changes-cybersecurity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/02-assess-your-level/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s00-course-introduction/02-prerequisites/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/02-sc200-exam/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/02-who-this-course-is-for/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/02-analyst-tiers-role-definitions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/02-mitigate-incidents/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/02-capabilities-matrix/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/02-query-pipeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/02-why-grc-fails-case-studies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/02-cui/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/02-creating-scheduled-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c10-future-ai-security/02-multi-model/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/02-scheduled-vs-nrt/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/02-sentinel-automation-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/02-building-the-soc-operations-workbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/02-designing-behaviour-change/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/02-mitre-attack-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/02-sentinel-hunting-experience/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/02-building-a-ti-collection-program/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/02-internal-audit-programme/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/02-incident-briefing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/02-parameterised-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/02-board-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/02-incident-briefing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k13-capstone-the-hunting-lab/02-scenario-credential-spray-bec/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/02-impact-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/02-incident-briefing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/02-incident-briefing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/02-staffing-skills/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/02-healthcare-infrastructure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/02-incident-briefing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/02-endpoint-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/02-onboarding/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/02-threat-modelling-detection-prioritisation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/02-where-string-operators/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/02-writing-policies-that-work/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/02-dlp-policy-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/02-rule-generation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/02-detection-anomalous-signin-unfamiliar-infrastructure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/02-risk-identification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/02-summarize-sets-lists/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/02-control-selection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/02-detection-inbox-forwarding-external/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/02-enabling-azure-resources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/02-executive-board/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/02-join-flavours/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/02-powershell-m365/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/02-detection-lolbin-execution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/02-extract-regex/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/02-architecture-setup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/02-risk-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/02-advanced-regex/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/02-analyze-query-results/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/02-context-leadership/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/02-detection-illicit-oauth-consent/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/02-framework-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/02-data-classification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/02-evidence-collection-preservation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/02-series-decompose/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/02-govern-function/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/02-workspace-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/02-attack-path-reconstruction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/02-microsoft-connectors/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/02-workspace-config/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/02-system-description/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/02-executive-incident-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/02-anti-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/02-common-anti-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/02-deepfakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/02-entra-id-hardening/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/02-lawful-bases/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/02-email-protection-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/foundation/f2-claude-ai-walkthrough/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/02-how-authentication-works/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/02-interactive-vs-noninteractive/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/02-system-assigned-managed-identities/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/02-how-b2b-guest-users-work/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/02-entitlement-management-packages/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/02-detection-rule-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/02-posture-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/02-break-glass-accounts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/02-cross-domain-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/02-authentication-methods-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/02-org-a-requirements/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/02-passwords-and-why-they-fail/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/02-assignments-users-groups/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/02-blocking-legacy-auth/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/02-sign-in-risk-detections/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/02-pim-entra-id-roles/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/02-where-tokens-live/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/02-analyzing-report-only-results/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/02-application-authentication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/s2-incident-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/02-ir-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/02-kape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/02-file-access-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/02-directory-enumeration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/02-advanced-hunting-ir/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/02-pre-encryption-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/02-mailbox-reconnaissance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/02-user-behavior-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/02-lolbin-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/02-technical-ir-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/02-evidence-collection-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/02-phase-b-endpoint-execution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/02-kape-collection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/02-amcache-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/02-usn-journal/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/02-logon-events/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/02-volatility3-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/02-pth-ptt-opth/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/02-risky-signins/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/02-mail-items-accessed/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/02-where-evidence-lives/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/02-live-response-commands/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/02-inodes-and-timestamps/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/02-authentication-logs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/02-scoping-the-brute-force/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/02-web-server-log-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/02-sudo-misconfigurations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/02-ssh-key-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/02-dwell-time-gap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/02-scoping-the-hunt/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/02-hunting-cloud-token-reuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/02-shadow-it-discovery/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/02-hunting-ransomware-reconnaissance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/02-hunting-data-hoarding/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/02-prioritization-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/02-negative-finding-value/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/02-sentinel-hunt-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/02-percentile-statistical-deviation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/02-mapping-rules-to-attack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/02-hunting-aitm-session-hijacking/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/02-hunting-inbox-rules-graph-api/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/02-hunting-role-assignments-outside-pim/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/02-hunting-bec-internal-accounts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/02-hunting-bulk-downloads/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/02-hunting-lolbin-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/002-departing-engineer/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/03-course-structure-module-map/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/03-how-to-learn/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/03-how-to-learn/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s00-course-introduction/03-how-to-learn/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/03-lab-setup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/03-data-types/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/03-organisational-positioning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/03-defender-office365/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/03-shift-handover-procedures/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/03-ai-security-literature/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c10-future-ai-security/03-ai-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/03-entity-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/03-logic-app-playbooks-for-enrichment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/03-nrt-microsoft-security-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/03-sp800-171/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/03-behavioural-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/03-detection-coverage-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/03-phishing-simulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/03-hunting-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/03-soc-operations-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/03-conducting-internal-audits/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/03-indicator-lifecycle-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/03-investigation-setup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/03-committee-structures/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/03-mailbox-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k13-capstone-the-hunting-lab/03-scenario-ransomware/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/03-identifying-replay/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/03-implementation-planning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/03-grc-tooling/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/03-identifying-consents/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/03-activity-reconstruction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/03-corporate-governance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/03-asr-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/03-email-attack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/03-mitre-attack-detection-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/03-minimum-viable-policy-set/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/03-where-datetime-filtering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/03-bin-time-grouping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/03-detection-mfa-fatigue/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/03-investigating-dlp-alerts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/03-mitre-documentation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/03-risk-analysis-scoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/03-statement-of-applicability/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/03-hybrid-multi-cloud/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/03-detection-inbox-rule-hiding-activity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/03-join-performance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/03-technical-findings/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/03-board-risk-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/03-python-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/03-detection-credential-dumping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/03-parse-json/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/03-prompting-promptbooks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/03-multi-table-statements/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/03-detection-shadow-it/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/03-let-functions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/03-planning-risk/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/03-risk-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/03-vendor-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/03-containment-decision-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/03-core-functions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/03-creating-workspace/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/03-anomaly-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/03-technical-investigation-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/03-defender-xdr-connector/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/03-roi-measurement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/03-multi-hop-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/03-trust-service-criteria/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/03-ai-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/03-exchange-online-hardening/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/03-partition-pruning-indexing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/03-ropa/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/03-safe-links/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/03-hunting-programme-starter/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/s3-threat-intel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/03-entra-id-security-stack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/03-service-principal-logs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/03-user-assigned-managed-identities/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/03-cross-tenant-access-inbound/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/03-entitlement-management-automation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/03-detecting-password-spray/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/03-daily-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/03-entra-id-resilience/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/03-defender-for-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/03-conditional-access-policy-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/03-org-a-solution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/03-authenticator-push-number-matching/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/03-target-resources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/03-stopping-password-spray/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/03-user-risk-detections/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/03-configuring-pim-settings/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/03-proxy-based-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/03-what-if-tool/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/03-client-secrets/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/03-investigation-mindset/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/03-eztools/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/03-file-download-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/03-privilege-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/03-live-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/03-encryption-timeline-reconstruction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/03-inbox-rule-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/03-usb-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/03-multi-stage-implant/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/03-executive-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/03-tabletop-exercises/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/03-phase-b-memory-lateral/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/03-full-disk-imaging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/03-shimcache-bam/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/03-zone-identifier-i30/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/03-process-creation-sysmon/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/03-process-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/03-dcsync-kerberoasting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/03-aitm-token-replay/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/03-inbox-rule-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/03-the-volatility-problem/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/03-remote-and-cloud-collection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/03-timestamp-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/03-journald-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/03-finding-the-breach-point/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/03-identifying-initial-exploit/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/03-suid-sgid-exploitation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/03-cron-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/foundation/f3-prompt-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/03-detection-pyramid/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/03-collection-iterative-querying/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/03-hunting-cloud-to-endpoint-pivot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/03-oauth-application-risk-scoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/03-hunting-backup-disruption/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/03-hunting-access-pattern-deviation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/03-staffing-models/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/03-leadership-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/03-jupyter-notebooks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/03-make-series-operator/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/03-visualizing-coverage-navigator/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/03-hunting-credential-stuffing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/03-hunting-mail-forwarding-redirect/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/03-hunting-global-admin-activation-anomalies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/03-hunting-internal-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/03-hunting-external-sharing-links/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/03-hunting-process-injection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/003-forwarding-rule/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/04-how-to-learn/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/04-lab-m365-tenant/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s00-course-introduction/04-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/04-prerequisites/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/04-workspace-setup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/04-escalation-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/04-evaluating-ai-tools/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/04-defender-endpoint/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/04-regulatory-drivers/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/04-type-conversion/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c10-future-ai-security/04-roadmap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/04-entity-mapping-enrichment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/04-logic-app-playbooks-for-notification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/04-ssp-poam/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/04-threshold-tuning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/04-hypothesis-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/04-ioc-sweeps/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/04-monthly-soc-report-template/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/04-role-based-training/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/04-email-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/04-executive-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/04-managing-external-audits/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/04-stixtaxii-integration-with-sentinel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/04-budgeting-for-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/04-email-thread-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k13-capstone-the-hunting-lab/04-scenario-data-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/04-horizon-scanning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/04-token-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/04-data-access/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/04-operating-model/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/04-insurance-emerging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/04-exfiltration-channels/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/04-extend-calculated-columns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/04-identity-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/04-ngp-edr-config/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/04-policy-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/04-writing-detection-rule-specifications/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/04-detection-impossible-travel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/04-insider-risk-policies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/04-risk-appetite-tolerance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/04-testing-tuning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/04-top-sort-take/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/04-cspm/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/04-detection-transport-rule-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/04-regulatory-legal/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/04-treatment-plans-residual-risk/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/04-union-combining-tables/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/04-detection-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/04-embedded-defender-xdr/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/04-risk-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/04-soar-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/04-string-functions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/04-detection-azure-resource-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/04-ai-act-nist/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/04-externaldata/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/04-support-operation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/04-string-data/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/04-aup-incident/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/04-baseline-comparison/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/04-log-tiers/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/04-playbook-aitm-credential-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/04-profiles-gap-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/04-windows-hosts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/04-evidence-collection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/04-evidence-documentation-chain-custody/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/04-identity-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/04-ciso-business-case/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/04-dpia/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/04-endpoint-security-baseline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/04-materialised-views-functions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/04-real-world-cases/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/04-safe-attachments/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/s4-compliance-policy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/04-soc-detection-rule-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/04-entra-admin-center/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/04-authentication-details/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/04-managed-identity-security-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/04-cross-tenant-access-outbound/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/04-access-reviews-groups/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/04-detecting-brute-force/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/04-weekly-health-check/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/04-conditional-access-policy-backup-and-recovery/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/04-defender-for-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/04-identity-protection-and-risk-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/04-org-b-requirements/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/04-fido2-security-keys/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/04-conditions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/04-defending-aitm/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/04-configuring-risk-policies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/04-pim-azure-resources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/04-device-based-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/04-policy-validation-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/04-certificate-authentication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/04-course-structure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/04-velociraptor/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/04-sharing-link-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/04-service-principal-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/04-air-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/04-ransomware-variant-identification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/04-invoice-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/04-email-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/04-advanced-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/04-attacker-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/04-ir-retainer-evaluation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/04-phase-c-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/04-remote-collection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/04-userassist-jumplists/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/04-sam-system-hives/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/04-powershell-logging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/04-network-dll-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/04-rdp-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/04-conditional-access-evaluation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/04-email-sending-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/04-three-investigation-environments/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/04-evidence-integrity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/04-deleted-file-recovery/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/04-auditd-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/04-post-auth-reconnaissance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/04-web-shell-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/04-cron-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/04-systemd-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/04-why-detection-engineering-is-not-enough/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/04-analysis-separating-signal/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/04-hunting-rdp-smb-wmi-psremoting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/04-hunting-graph-api-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/04-hunting-credential-harvesting-for-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/04-resignation-termination-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/04-hunt-to-detection-pipeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/04-technical-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/04-hunting-workbooks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/04-series-decompose-anomalies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/04-identifying-coverage-gaps/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/04-hunting-password-spray/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/04-hunting-oauth-consent-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/04-hunting-emergency-access-misuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/04-hunting-vendor-email-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/04-hunting-email-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/04-hunting-registry-scheduled-task-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/004-soc-aitm-credential-harvest/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/foundation/f4-files-and-context/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s00-course-introduction/05-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/05-how-to-learn/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/05-lab-azure-sentinel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/05-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/05-first-ai-security-task/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/05-data-handling/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/05-defender-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/05-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/05-null-handling/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/05-operational-metrics-kpis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/05-incident-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/05-logic-app-playbooks-for-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/05-correlated-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c10-future-ai-security/05-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/05-assessment-process/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/05-hunt-management-bookmarks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/05-bookmarks-evidence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/05-quarterly-soc-maturity-review/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/05-security-champions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/05-converting-ti-into-detection-hypotheses/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/05-detection-health-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/05-signin-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/05-finding-lifecycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k13-capstone-the-hunting-lab/05-review-scoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/05-communicating-bad-news/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/05-fraudulent-email/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/05-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/05-non-interactive-deep-dive/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/05-maturity-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/05-revocation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/05-evidence-preservation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/05-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/05-detection-rule-quality-metrics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/05-device-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/05-insider-cloud-ransomware/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/05-mapping-policies-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/05-project-family/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/05-detection-program/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/05-building-risk-register/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/05-detection-privileged-role-assignment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/05-investigating-insider-risk/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/05-pivot-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/05-defender-for-servers/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/05-detection-bulk-mailbox-access/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/05-employee-pir/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/05-kql-control-verification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/05-lookup-enrichment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/05-code-review/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/05-detection-persistence-mechanisms/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/05-embedded-sentinel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/05-quarterly-risk-review/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/05-url-email-decomposition/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/05-detection-storage-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/05-ip-range-functions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/05-performance-improvement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/05-privacy-cloud-ai/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/05-security-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/05-board-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/05-retention-cost-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/05-implementation-tiers/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/05-playbook-bec-financial-fraud/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/05-rate-of-change/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/05-cef-connectors/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/05-network-graph-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/05-change-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/05-regulatory-notification-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/05-working-with-cpa/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/05-cloud-application-hardening/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/05-data-subject-rights/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/05-defending-workflows/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/05-optimising-joins-timeseries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/05-zap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/s5-security-automation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/05-soc-email-detection-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/05-attack-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/05-conditional-access-evaluation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/05-federation-at-scale/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/05-trust-settings/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/05-access-reviews-roles/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/05-detecting-aitm/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/05-ca-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/05-directory-object-backup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/05-how-dfi-enriches-entra-id-risk-detections/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/05-privileged-access-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/05-org-b-solution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/05-passkeys-authenticator/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/05-named-locations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/05-preventing-mfa-fatigue/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/05-risk-remediation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/05-pim-activation-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/05-infrastructure-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/05-gap-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/05-workload-identity-federation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/05-toolkit-overview/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/05-volatility3/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/05-teams-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/05-app-registration-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/05-attack-disruption/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/05-data-exfiltration-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/05-internal-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/05-cloud-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/05-c2-communication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/05-regulatory-notification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/05-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/05-phase-c-email-files/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/05-memory-acquisition/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/05-registry-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/05-software-ntuser/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/05-service-driver-events/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/05-code-injection-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/05-psexec-smb-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/05-oauth-consent-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/05-transport-rule-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/05-the-attackers-perspective/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/05-the-collection-sequence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/05-timeline-generation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/05-syslog-and-system-logs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/05-credential-harvesting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/05-reverse-shell-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/05-kernel-exploit-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/05-user-account-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/foundation/f5-safety-limitations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/05-threat-landscape-driving-demand/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/05-concluding-the-hunt/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/05-hunting-service-account-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/05-hunting-excessive-permissions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/05-hunting-staging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/05-hunting-privilege-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/05-soc-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/05-knowledge-base/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/05-maturity-continuum/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/05-series-fir-smoothing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/05-coverage-clustering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/05-hunting-mfa-fatigue/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/05-hunting-admin-consent-tenant-access/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/05-hunting-service-principal-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/05-hunting-mail-flow-rule-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/05-hunting-teams-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/05-hunting-defense-evasion/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/005-soc-ransomware-race/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/06-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/06-lab-sample-data/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/06-building-foundation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g01-what-grc-is/06-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/06-defender-cloud-apps/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/06-soc-charter/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/06-automation-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/06-testing-validation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/06-scoping-small-contractors/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/06-soar-integration-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/06-reusable-query-library/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/06-continuous-improvement-cycle/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/06-livestream/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/06-measuring-effectiveness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/06-automated-report-generation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/06-managing-multiple-audits/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/06-post-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/06-ti-driven-threat-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/06-financial-impact/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/06-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/06-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/06-tenant-audit/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/06-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/06-hr-legal/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/06-false-positive-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/06-multi-surface/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/06-response-actions/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/06-detection-service-principal-credential/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/06-kql-risk-evidence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/06-audit-standard-premium/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c03-threat-intel-detection/06-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/06-cross-table-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/06-storage-sql-appservice/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/06-detection-aitm-phishing-indicators/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/06-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c04-ir-documentation/06-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/06-building-log-parsers/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/06-detection-ransomware-pre-encryption/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/06-embedded-entra-purview-dfc/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/06-kql-grc-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/06-soar-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/06-annex-a-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/06-compliance-workflow/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/06-query-library/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/06-detection-cross-tenant-anomalies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/06-watchlist-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/06-building-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/06-cross-mapping-iso27001/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/06-key-tables-schema/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/06-playbook-ransomware-pre-encryption/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/06-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/06-process-tree-reconstruction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/06-soc2-sales-enabler/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/06-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/06-syslog-sources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/06-stakeholder-communication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/06-breach-notification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/06-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/06-email-auth/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/06-hardening-validation-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/06-query-limits-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/security/s6-ai-security-risks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/06-soc-playbook-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/06-identity-kill-chain/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/06-risk-signals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/06-conditional-access-workload-identities/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/06-conditional-access-external-users/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/06-access-reviews-applications/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/06-detecting-consent-grants/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/06-credential-hygiene/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/06-pim-configuration-backup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/06-automatic-attack-disruption-for-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/06-application-and-workload-identity-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/06-org-c-requirements/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/06-certificate-based-auth/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/06-device-compliance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/06-token-theft-defense/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/06-risky-users-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/06-access-reviews/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/06-token-protection-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/06-troubleshooting-access-failures/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/06-permission-governance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/06-course-connections/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/06-cloud-tools/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/06-sensitivity-labels-dlp/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/06-conditional-access-modification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/06-custom-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/06-scope-determination/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/06-financial-transaction-tracing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/06-print-screenshot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/06-long-dwell-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/06-lessons-learned/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/06-purple-team/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/06-phase-c-cross-domain/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/06-m365-preservation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/06-advanced-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/06-shellbags/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/06-rdp-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/06-cmdline-handle-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/06-wmi-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/06-audit-log-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/06-mail-flow-trace/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/06-course-structure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/06-memory-acquisition/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/06-attacker-staging-areas/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/06-web-server-log-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/06-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/06-application-log-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/06-container-escape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/06-shell-config-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/06-hunting-vs-ir-vs-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/06-converting-hunts-to-detections/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/06-hunting-vpn-pivot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/06-hunting-dormant-applications/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/06-hunting-known-ransomware-tooling/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/06-hunting-after-hours-activity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/06-hunt-program-charter/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/06-programme-metrics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/06-continuous-hunting-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/06-top-nested-frequency/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/06-threat-intelligence-prioritization/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/06-hunting-mfa-bypass/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/06-hunting-mfa-registration-persistence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/06-hunting-admin-consent-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/06-hunting-financial-keyword-interception/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/06-hunting-unmanaged-device-downloads/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/06-hunting-c2-beaconing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/006-claude-bec-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k01-how-kql-processes-data/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c01-ai-security-landscape/07-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/07-tool-stack-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/07-soc-workflow/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/07-automation-testing-and-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/07-playbooks-logic-apps/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/07-benchmarking-against-industry-standards/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/07-search-jobs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/07-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/07-ti-operations-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/07-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/07-cae/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/07-preventive-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/07-covert-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/07-automated-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/07-prompt-library/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g02-policy-framework/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k02-filtering-and-shaping-data/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/07-detection-as-code/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k03-aggregation-and-statistical-analysis/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/07-detection-conditional-access-modification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/07-audit-log-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g04-risk-treatment-controls/07-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/07-containers-kubernetes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/07-detection-mailbox-delegation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/07-materialize-let-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/07-code-review/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/07-detection-data-staging-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/07-incident-investigation-copilot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/07-certification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/07-detection-app-permission-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/07-performance-debugging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c06-compliance-policy/07-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/07-playbook-maintenance-improvement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/07-watchlists/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/07-data-collection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/07-post-incident-review-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/07-hardening-change-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/07-transfers-dpo/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/07-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/07-transport-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c07-ai-governance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/07-zero-trust-and-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/07-device-location-signals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/07-workload-identity-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/07-external-user-onboarding/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/07-lifecycle-workflows-joiner/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/07-detecting-role-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/07-alert-triage/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/07-application-registration-backup/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/07-when-disruption-fires-and-when-it-does-not/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/07-identity-governance-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/07-org-c-solution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/07-authentication-strength-policies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/07-grant-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/07-consent-phishing-defense/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/07-risky-signins-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/07-pim-monitoring-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/07-continuous-access-evaluation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/07-common-misconfigurations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/07-consent-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/07-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/07-powershell-ir/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/07-onedrive-endpoint-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/07-federation-trust-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/07-sentinel-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/07-containment-eradication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/07-evidence-preservation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/07-cross-source-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/07-data-staging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/07-report-sanitisation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/07-ir-metrics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/07-phase-d-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/07-chain-of-custody/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/07-kape-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/07-deleted-recovery-antiforensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/07-task-wmi-events/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/07-cobalt-strike-extraction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/07-powershell-remoting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/07-mfa-bypass-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/07-ediscovery-evidence-preservation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/07-linux-distribution-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/07-disk-imaging/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/07-suid-sgid-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/07-application-and-service-logs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/07-persistence-mechanisms/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/06-post-exploitation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/07-advanced-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/07-shared-library-injection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/07-soc-hardening-validation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/07-roi-of-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/07-hunt-documentation-standard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/07-hunting-ntlm-kerberos-anomalies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/07-hunting-ai-tool-usage/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/07-temporal-chain-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/07-hunting-external-communication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/07-hunt-tooling-workspace/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/07-report-quality-stakeholders/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/07-course-conclusion/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/07-autocluster-behavioral-grouping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/07-data-availability-scoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/07-custom-impossible-travel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/07-hunting-ca-policy-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/07-hunting-security-group-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/07-consolidated-forwarding-audit/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/07-multi-channel-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/07-hunting-fileless-execution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/007-claude-detection-gap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/08-cross-product-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/08-soc-maturity-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/08-automation-runbook-pack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/08-ueba/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/08-hunt-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/08-reporting-to-non-technical-stakeholders/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/08-eradication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/08-ti-maturity-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/08-law-enforcement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/08-token-protection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/08-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/08-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/08-building-managing-detection-backlog/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c02-investigation-methodology/08-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/08-vulnerability-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g03-risk-assessment-methodology/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/08-detection-password-spray/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/08-ediscovery-content-search/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/08-detection-bec-outbound-email/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/08-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/08-security-alerts-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g05-risk-monitoring-reporting/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k05-string-parsing-and-data-extraction/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/08-detection-powershell-script-execution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c05-security-automation/08-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/08-hunting-kql-generation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k06-advanced-filtering-and-pattern-matching/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/08-detection-cloud-session-anomalies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/08-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/08-exercises/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/08-building-custom-playbooks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g07-nist-csf-implementation/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k07-time-series-analysis-and-anomaly-detection/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/08-threat-intelligence/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/08-custom-logs-api/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/08-ir-report-template-pack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/08-hardening-checklist-pack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/08-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/08-threat-explorer/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/08-soc-endpoint-cloud-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c08-team-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/08-real-world-breaches/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/08-kql-fundamentals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/08-building-workload-baselines/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/08-entitlement-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/08-lifecycle-workflows-mover/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/08-detecting-pim-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/08-escalation-handoff/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/08-compromised-tenant-response-initial-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/08-security-copilot-for-identity-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/08-detection-and-response-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/08-peer-review-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/08-passwordless-and-tap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/08-session-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/08-blocking-unauthorized-platforms/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/08-tuning-identity-protection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/08-emergency-access-pim/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/08-session-lifetime/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/08-change-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/08-admin-consent-workflow/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k08-graph-and-relationship-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/08-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/08-jump-bag/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/08-data-exposure-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/08-token-theft-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/08-ir-workflow-xdr/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/08-recovery-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/08-containment-remediation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/08-evidence-preservation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/08-threat-intel-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/08-report-quality/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/08-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/08-phase-e-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/08-evidence-storage/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/08-timeline-construction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/08-investigation-synthesis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/08-log-gaps-antiforensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/08-workflow-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/08-lateral-movement-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/08-identity-compromise-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/08-email-compromise-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/08-investigation-toolkit-overview/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/08-container-collection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/08-user-artifact-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/08-cross-log-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/08-investigation-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/07-privilege-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/08-escalation-chain/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/08-pam-backdoor/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g08-soc2-implementation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/08-organizational-readiness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/08-hypothesis-prioritization/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/08-hunting-aad-connect-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/08-hunting-unsanctioned-uploads/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/08-pre-ransomware-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/08-multi-source-behavioral-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/08-programme-maturity-roadmap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/08-trend-analysis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/08-automating-hunt-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/08-arg-max-min-entity-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/08-impact-severity-scoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/08-session-hijacking-non-interactive/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/08-hunting-federated-trust-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/08-hunting-ca-weakening-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/08-email-campaign-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/08-exfiltration-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/08-hunting-process-trees/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/09-workbooks-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/09-mini-capstone/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/09-mitre-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/09-campaign-tracking/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/09-eradication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/09-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/09-cross-product-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k04-joining-and-correlating-data/09-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/09-regulatory-compliance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/09-governance-plugins-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g06-iso27001-implementation/09-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/09-defender-xdr-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/09-troubleshooting-validation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/09-air-email/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/09-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c09-adversarial-ai/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/09-soc-automation-deployment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/09-lab-environment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/09-advanced-query-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/09-workload-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/09-guest-access-reviews/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/09-lifecycle-workflows-leaver/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/09-detecting-ca-manipulation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/09-operational-runbooks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/09-compromised-tenant-response-containment-and-eradication/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/09-security-copilot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/09-architecture-by-organization-size/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/09-planning-migration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/09-zero-trust-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/09-credential-stuffing-defense/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/09-attack-disruption/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/09-privileged-access-strategy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/09-protecting-prt/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/09-policy-drift-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/09-publisher-verification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g09-gdpr-privacy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/09-native-windows/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/09-identity-persistence-check/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/09-scope-data-exposure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/09-containment-access-revocation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/09-apt-containment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/09-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/09-eradication-verification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/09-legal-considerations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/09-event-log-synthesis/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/09-linux-security-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/09-triage-decision-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/09-anti-forensics-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/09-log-integrity-and-tampering-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/09-containment-remediation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/08-database-credential-theft/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/09-containment-remediation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/09-kernel-module-rootkit/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k09-performance-optimisation-and-scale/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/09-common-hunting-myths/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/09-multi-table-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/09-lateral-movement-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/09-application-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/09-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/09-insider-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/09-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/09-dynamic-column-parsing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/09-composite-score-matrix/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/09-hunting-compromised-service-principals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/09-temporal-correlation-initial-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/09-temporal-correlation-escalation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/09-email-threat-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/09-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/09-endpoint-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/01-defender-xdr/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s01-soc-foundations-operational-readiness/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/10-asim-parsers/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/10-notebooks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/10-scope-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/10-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/10-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/10-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/02-defender-endpoint/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s02-detection-engineering-methodology/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s03-kql-detection-identity-access/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s04-kql-detection-email-collaboration/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/10-cross-product-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s05-kql-detection-endpoint-lateral/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/10-cross-product-copilot/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/06-kql-fundamentals/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s06-kql-detection-cloud-saas/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s07-investigation-playbook-framework/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/10-content-hub/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s08-ir-documentation-reporting/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/10-cost-optimisation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s09-hardening-baselines-security-config/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/10-soc-metrics-workbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s10-sentinel-automation-workflows/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g10-cmmc-implementation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k10-detection-rule-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/10-course-structure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/10-cross-table-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/10-credential-migration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/10-monitoring-external-activity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/10-hr-driven-provisioning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/10-detecting-impossible-travel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/10-monthly-review/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/10-compromised-tenant-response-recovery-and-verification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/10-the-unified-identity-investigation-workflow/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/10-the-90-day-deployment-roadmap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/10-deploying-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/10-break-glass-accounts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/10-insider-threat-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/10-identity-protection-sentinel/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/10-pim-for-groups/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/10-token-theft-detection/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/10-validating-session-controls/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/10-lifecycle-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/10-scanning-detection-tools/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/10-legal-regulatory-coordination/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/10-legal-coordination/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/10-post-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/10-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/10-building-your-lab/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/10-collection-automation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/10-filesystem-investigation-workflow/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/10-the-log-analysis-workflow/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/10-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/10-data-exfiltration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/10-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/10-persistence-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/10-data-sources-for-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/10-behavioral-baselining/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/10-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/10-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/10-common-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/10-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/10-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/10-materialize-performance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/10-assembling-hunt-backlog/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/10-time-series-authentication-anomalies/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/10-persistence-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/10-escalation-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/10-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/10-common-exfiltration-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/10-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c10-future-ai-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/11-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/11-building-programme/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/11-ciso-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/11-hardening/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/11-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/03-purview/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/11-workspace-health/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/11-complete-pipeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/09-defender-office365/11-module-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/11-soc-ti-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/11-building-baseline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/11-workload-access-reviews/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/11-detecting-external-threats/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/11-governance-monitoring/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/11-detecting-token-theft/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/11-leadership-metrics/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/11-identity-tabletop-exercise-scenarios/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/11-cross-domain-incident-response-for-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/11-compliance-framework-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/11-external-methods-retirement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/11-policy-design-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/11-attack-chain-defense/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/11-operationalizing-risk/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/11-pim-operational-procedures/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/11-token-theft-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/11-testing-break-glass/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/11-detecting-malicious-activity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/11-magnet-axiom/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir02-evidence-acquisition/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/11-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/09-web-compromise-timeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/11-eradication-verification/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s11-soc-metrics-reporting-improvement/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g11-security-awareness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/11-the-human-factor/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/11-working-with-false-positives/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/11-common-lateral-movement-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/11-common-application-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/11-pre-ransomware-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/11-common-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/11-entity-pivoting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/11-selecting-first-campaigns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/11-correlating-indicators/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/11-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/11-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/11-common-email-hunting-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/11-exfiltration-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/11-common-endpoint-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k11-threat-hunting-with-kql/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/12-hardening/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/04-defender-for-cloud/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/05-security-copilot/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/12-rbac-governance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g12-audit-management/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/12-claude-investigation-prompts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s12-threat-intelligence-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/12-query-library/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/12-multi-cloud-workload-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/12-external-identity-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/12-governance-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/12-detecting-workload-compromise/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/12-monthly-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/12-business-continuity-planning-for-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/12-identity-data-in-defender-xdr-advanced-hunting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/12-the-ongoing-operations-calendar/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/12-operations-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/12-ca-as-code/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/12-defense-verification-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/12-advanced-risk-scenarios/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/12-advanced-pim-scenarios/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/12-browser-session-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/12-validation-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/12-application-security-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx01-evidence-collection/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx02-filesystem-forensics/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx03-log-analysis/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx04-ssh-brute-force-compromise/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/10-detection-hardening/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx06-privilege-escalation/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/12-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/12-hunting-maturity-models/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/12-escalation-protocols/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/12-lateral-movement-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/12-application-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/12-insider-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/12-graph-semantics-process-trees/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/12-validating-hypotheses/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/12-identity-hunt-report/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/12-common-persistence-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/12-common-escalation-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/12-email-threat-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/12-endpoint-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k12-workbooks-dashboards-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/10-create-detections-investigations/13-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/11-threat-hunting/13-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/13-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/13-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/08-connect-logs-sentinel/13-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/13-claude-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k13-capstone-the-hunting-lab/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th08-hunting-data-exfiltration/13-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/13-workload-incident-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/13-b2b-direct-connect/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/13-compliance-framework-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/13-detecting-external-threats/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/13-program-effectiveness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/13-the-identity-resilience-checklist/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/13-building-cross-domain-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/13-architecture-review-and-evolution/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/13-privilege-escalation-defense/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/13-risk-posture-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/13-non-interactive-token-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/13-securing-registrations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g13-grc-leadership/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/13-bec-financial-fraud/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir01-toolkit-setup/13-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/11-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/13-building-the-leadership-case/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/13-worked-end-to-end/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th12-hunting-pre-ransomware-activity/13-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/13-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/13-time-window-correlation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/13-backlog-maintenance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/13-converting-to-detection-rules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/13-persistence-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/13-escalation-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/14-lessons-learned/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/07-sentinel-workspace/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/14-claude-ir-documentation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th14-building-a-hunt-program/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th07-hunting-email-threats/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th09-hunting-endpoint-threats/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th11-hunting-application-api-abuse/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei01-sign-in-logs/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/14-governance-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/14-governance-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/14-unified-governance-program/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/14-detecting-governance-failures/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/14-maturity-model/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/14-configuration-as-code-for-identity/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/14-complete-soc-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/14-what-comes-next-the-learning-path/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei02-authentication-methods/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei03-conditional-access-architecture/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/14-workload-identity-attacks/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/14-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei06-privileged-identity-management/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/14-token-security-architecture/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei08-conditional-access-validation/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/14-governance-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/14-token-replay/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx05-web-application-compromise/12-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/lx07-persistence-mechanisms/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/14-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/14-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g14-regulatory-change/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/14-hunting-program-metrics-dashboard/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/14-hunt-cadence-scheduling/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th13-hunting-insider-threats/14-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/14-functions-saved-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/14-common-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/14-common-identity-hunting-mistakes/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/15-claude-automation-scripting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g15-building-grc-function/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th05-hunting-cloud-persistence/15-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th06-hunting-privilege-escalation/15-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/15-detecting-credential-exposure/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei05-identity-protection/15-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th15-hunt-documentation-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/15-consent-phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/15-first-90-days/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/15-quality-assurance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/15-advanced-aggregation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/15-from-analysis-to-action/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/15-identity-hunt-playbook/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/12-aitm-credential-phishing/16-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/16-claude-governance-framework/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei10-workload-identity/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei11-external-identities/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei12-identity-governance/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/16-entity-mapping/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei14-monitoring-operations/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei15-backup-recovery/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei07-token-security/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei09-application-security/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei16-defender-integration/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/16-insider-threat/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/16-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/16-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th16-scaling-hunts/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g16-sector-governance/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/16-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/16-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/16-kql-anti-patterns/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th03-attack-coverage-analysis/17-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th04-hunting-identity-compromise/17-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/17-automated-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/17-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/17-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th01-hunt-methodology/17-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/17-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei18-capstone/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/18-detection-tuning/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/15b-identity-risk-register/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei04-conditional-access-attacks/18-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th02-advanced-kql-hunting/18-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/19-coverage-assessment/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/15c-deployment-verification-queries/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/20-detection-testing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/15d-course-cross-reference-index/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/21-detection-rule-library/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/15-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/22-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei17-complete-design/16-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei13-detection-engineering/23-check-my-knowledge/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir18-building-ir-readiness/07b-readiness-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir10-sharepoint-onedrive-teams/08b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir11-entra-id-investigation/08b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir12-defender-xdr-platform/08b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir17-ir-reporting/08b-reporting-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir16-apt-investigation/09b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir19-capstone/09b-capstone-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir03-execution-persistence/08b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir04-filesystem-registry/09b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir05-event-log-analysis/09b-event-log-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/09-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir07-lateral-movement/09-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir08-m365-identity-compromise/09-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir09-exchange-online-forensics/09-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir06-memory-forensics/09c-investigation-checklist/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ei-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir13-ransomware-investigation/10b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir14-bec-investigation/10b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/ir15-insider-threat-investigation/10b-investigation-command-reference/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/aitm/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/anatomy-of-an-aitm-attack/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/bec/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/dfir/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/incident-response/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/microsoft-365/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/phishing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/tags/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/inside-m365-security-operations-course/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/inside-practical-ir-course/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/inside-soc-operations-course/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/inside-mastering-kql-course/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/inside-practical-grc-course/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/inside-claude-security-professionals-course/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/the-complete-ridgeline-curriculum/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/5-kql-queries-every-soc-analyst-should-bookmark/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/anatomy-of-five-wave-aitm-campaign/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/why-we-built-ridgeline/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/th10-hunting-lateral-movement/12-module-summary/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/about/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/blog/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/categories/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/claude-essentials/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/claude-security-professionals/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/00-course-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/c00-course-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/g00-course-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir00-course-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/k00-course-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/s00-course-introduction/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/downloads/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/feedback/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/mastering-kql/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/labs/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/learning-paths/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/review/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/admin-to-defender/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/mastering-kql/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/m365-security-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/entra-id-security/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/account/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/practical-grc/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/practical-linux-ir/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/practical-ir/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/threat-hunting-m365/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/gate/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/pricing/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/privacy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ir-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/17-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/c11-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/g17-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/k14-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/paid/s13-references/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/refund-policy/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/reset-password/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/resources/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/challenges/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/reset-confirm/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/login/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/courses/soc-operations/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/subscribe/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/terms/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/th00-detection-gap/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/ei00-identity-threat-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/free/lx00-linux-ir-landscape/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/modules/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://training.ridgelinecyber.com/welcome/</loc><lastmod>2026-04-03T18:53:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>