<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.decodedsecurity.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://www.decodedsecurity.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/23-security-domains-explained-what</loc><lastmod>2026-04-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/what-actually-happens-when-you-open</loc><lastmod>2026-03-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/13-how-to-pass-security-in-4-weeks</loc><lastmod>2026-03-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/this-is-how-i-explain-subnetting</loc><lastmod>2026-03-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/7-networking-questions-that-instantly</loc><lastmod>2026-03-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/why-most-beginners-dont-understand</loc><lastmod>2026-03-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/digital-signatures-explained-with</loc><lastmod>2026-03-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/virus-vs-worm-the-malware-basics</loc><lastmod>2026-03-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-3-skills-that-matter-most-for</loc><lastmod>2026-02-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/diffie-hellman-explained-like-youre</loc><lastmod>2026-02-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/top-5-most-important-network-protocols</loc><lastmod>2026-02-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/top-5-linux-command-for-an-entry</loc><lastmod>2026-02-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/this-is-how-i-explain-dns-to-beginners</loc><lastmod>2026-02-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/start-here-decoded-security-roadmap</loc><lastmod>2026-03-27</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-incident-response-mistakes-that</loc><lastmod>2026-01-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/3-things-you-need-to-know-for-your</loc><lastmod>2026-01-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/shadow-ai-is-the-new-shadow-it-only</loc><lastmod>2026-01-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/how-to-choose-the-right-cybersecurity</loc><lastmod>2026-03-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/5-specific-steps-for-software-developers</loc><lastmod>2026-01-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/why-good-engineers-fail-the-cissp</loc><lastmod>2026-01-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/why-reasonable-security-decisions</loc><lastmod>2026-01-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/5-simple-things-you-should-do-to</loc><lastmod>2026-01-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/ai-didnt-take-our-privacy-we-gave</loc><lastmod>2025-12-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-8-security-principles-every-cissp</loc><lastmod>2025-12-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/guest-post-the-feeder-company-leaderboard</loc><lastmod>2025-12-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-aaa-framework-can-your-cowokers</loc><lastmod>2025-12-10</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/guest-post-you-passed-the-cissp-now</loc><lastmod>2025-12-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-nines-arent-enough-the-7-things</loc><lastmod>2025-12-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/containers-vs-virtual-machines-the</loc><lastmod>2025-12-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-final-goodbye-how-to-dispose</loc><lastmod>2025-11-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/15-laws-every-cissp-candidate-must</loc><lastmod>2025-11-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-qr-code-trap-why-those-little</loc><lastmod>2025-11-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-psychology-of-hacking-why-smart</loc><lastmod>2025-11-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/quantitative-risk-analysis-let-the</loc><lastmod>2025-11-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/gdpr-explained-the-privacy-law-that</loc><lastmod>2025-11-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-storage-mistake-90-of-people</loc><lastmod>2025-11-14</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/free-cybersecurity-tools-and-resources</loc><lastmod>2026-03-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/compliance-privacy-and-post-quantum</loc><lastmod>2025-11-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-complete-guide-to-firewall-types</loc><lastmod>2025-11-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/get-control-over-your-results-how</loc><lastmod>2025-11-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/cissp-domain-3-why-two-systems-using</loc><lastmod>2025-10-31</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/3-things-that-surprise-me-about-cissp</loc><lastmod>2025-10-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/how-i-passed-the-cissp-exam-in-3</loc><lastmod>2025-12-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/6-myths-that-are-killing-corporate</loc><lastmod>2025-09-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/risk-management-managing-risks-in</loc><lastmod>2025-09-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/what-are-the-things-that-keep-our</loc><lastmod>2025-09-15</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/how-risk-management-frameworks-keep</loc><lastmod>2025-09-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/the-data-lifecycle-from-creation</loc><lastmod>2025-09-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/cloud-based-systems</loc><lastmod>2025-08-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/floods-cybersecurity-and-survival</loc><lastmod>2025-08-18</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/why-we-need-to-be-lawyers-intellectual</loc><lastmod>2025-08-11</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/invite-friends-earn-rewards</loc><lastmod>2026-03-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/access-controls</loc><lastmod>2025-08-06</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/certification-hub</loc><lastmod>2026-04-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/cybersecurity-controls-from-zero</loc><lastmod>2025-07-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/test-your-cybersecurity-knowledge</loc><lastmod>2025-12-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/security-policies-standards-and-procedures</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/what-does-ceo-have-to-do-with-cybersecurity</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/week-3-of-my-cissp-journey-from-motivation</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/threat-risk-vulnerability-why-cissp</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/my-first-week-of-cissp-prep-what</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/my-cissp-journey-begins-why-im-doing</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/certification-authorities-cas-what</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/3-reasons-why-you-should-always-use</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/how-phishing-works-in-5-steps</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/introduction-to-the-tcpip-model</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/access-control-concepts-101-logical</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/understanding-the-isoosi-model-why</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/risk-management-in-cybersecurity</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/cybersecurity-basics-the-data-security</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/hashing-algorithms-what-any-cybersecurity</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/cybersecurity-101-methods-of-authentication</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/hashing-what-it-is-and-why-its-not</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://www.decodedsecurity.com/p/symmetric-vs-asymmetric-encryption</loc><lastmod>2025-07-21</lastmod><changefreq>monthly</changefreq></url></urlset>