<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://deckr.io/</loc></url>
  <url><loc>https://deckr.io/article</loc></url>
  <url><loc>https://deckr.io/article/2025-cyberlearning</loc></url>
  <url><loc>https://deckr.io/article/2025-cybersecurity-recap</loc></url>
  <url><loc>https://deckr.io/article/2025-incident-preparedness</loc></url>
  <url><loc>https://deckr.io/article/Best-Cybersecurity-Learning-Platforms</loc></url>
  <url><loc>https://deckr.io/term/access-control</loc></url>
  <url><loc>https://deckr.io/term/phishing</loc></url>
  <url><loc>https://deckr.io/term/dmarc</loc></url>
  <url><loc>https://deckr.io/term/snmp</loc></url>
  <url><loc>https://deckr.io/term/spf</loc></url>
  <url><loc>https://deckr.io/term/domainkeys-identified-mail-dkim</loc></url>
  <url><loc>https://deckr.io/term/cia-triad</loc></url>
  <url><loc>https://deckr.io/term/confidentiality</loc></url>
  <url><loc>https://deckr.io/term/integrity</loc></url>
  <url><loc>https://deckr.io/term/availability</loc></url>
  <url><loc>https://deckr.io/term/malware</loc></url>
  <url><loc>https://deckr.io/term/firewalls</loc></url>
  <url><loc>https://deckr.io/term/sql-injection</loc></url>
  <url><loc>https://deckr.io/term/zero-day</loc></url>
  <url><loc>https://deckr.io/term/distributed-denial-of-service-ddos-attack</loc></url>
  <url><loc>https://deckr.io/term/penetration-testing</loc></url>
  <url><loc>https://deckr.io/term/ransomware</loc></url>
  <url><loc>https://deckr.io/term/https</loc></url>
  <url><loc>https://deckr.io/term/http</loc></url>
  <url><loc>https://deckr.io/term/virtual-private-network-vpn</loc></url>
  <url><loc>https://deckr.io/term/xss</loc></url>
  <url><loc>https://deckr.io/term/advanced-persistent-threat-apt</loc></url>
  <url><loc>https://deckr.io/term/pki</loc></url>
  <url><loc>https://deckr.io/term/security-information-and-event-management-siem</loc></url>
  <url><loc>https://deckr.io/term/threat-hunting</loc></url>
  <url><loc>https://deckr.io/term/iot-security</loc></url>
  <url><loc>https://deckr.io/term/devsecops</loc></url>
  <url><loc>https://deckr.io/term/honeypot</loc></url>
  <url><loc>https://deckr.io/term/digital-forensics</loc></url>
  <url><loc>https://deckr.io/term/smurf-attack</loc></url>
  <url><loc>https://deckr.io/term/fraggle-attack</loc></url>
  <url><loc>https://deckr.io/term/dictionary-attack</loc></url>
  <url><loc>https://deckr.io/term/encryption</loc></url>
  <url><loc>https://deckr.io/term/industrial-control-system-ics</loc></url>
  <url><loc>https://deckr.io/term/operational-technology-ot</loc></url>
  <url><loc>https://deckr.io/term/supervisory-control-and-data-acquisition</loc></url>
  <url><loc>https://deckr.io/term/distributed-control-system-dcs</loc></url>
  <url><loc>https://deckr.io/term/programmable-logic-controller-plc</loc></url>
  <url><loc>https://deckr.io/term/remote-terminal-unit-rtu</loc></url>
  <url><loc>https://deckr.io/term/human-machine-interface-hmi</loc></url>
  <url><loc>https://deckr.io/term/engineering-workstation-ews</loc></url>
  <url><loc>https://deckr.io/term/basic-process-control-system-bpcs</loc></url>
  <url><loc>https://deckr.io/term/safety-instrumented-system-sis</loc></url>
  <url><loc>https://deckr.io/term/safety-integrity-level-sil</loc></url>
  <url><loc>https://deckr.io/term/safety-instrumented-function-sif</loc></url>
  <url><loc>https://deckr.io/term/plant-historian</loc></url>
  <url><loc>https://deckr.io/term/purdue-model</loc></url>
  <url><loc>https://deckr.io/term/industrial-demilitarized-zone-idmz</loc></url>
  <url><loc>https://deckr.io/term/zones-and-conduits-iec-62443</loc></url>
  <url><loc>https://deckr.io/term/ot-network-segmentation</loc></url>
  <url><loc>https://deckr.io/term/unidirectional-gateway-data-diode</loc></url>
  <url><loc>https://deckr.io/term/ot-jump-server</loc></url>
  <url><loc>https://deckr.io/term/ics-deep-packet-inspection-dpi</loc></url>
  <url><loc>https://deckr.io/term/ot-asset-inventory</loc></url>
  <url><loc>https://deckr.io/term/ot-patch-management</loc></url>
  <url><loc>https://deckr.io/term/ics-incident-response</loc></url>
  <url><loc>https://deckr.io/term/modbus-tcp</loc></url>
  <url><loc>https://deckr.io/term/dnp3</loc></url>
  <url><loc>https://deckr.io/term/ethernet-ip-cip</loc></url>
  <url><loc>https://deckr.io/term/opc-classic-and-ua</loc></url>
  <url><loc>https://deckr.io/term/hart-protocol</loc></url>
  <url><loc>https://deckr.io/term/ics-kill-chain</loc></url>
  <url><loc>https://deckr.io/term/isa-iec-62443</loc></url>
  <url><loc>https://deckr.io/term/ics-backup-and-recovery</loc></url>
  <url><loc>https://deckr.io/term/profinet</loc></url>
  <url><loc>https://deckr.io/term/authentication-authorization-accounting-aaa</loc></url>
  <url><loc>https://deckr.io/term/access-control-list-acl</loc></url>
  <url><loc>https://deckr.io/term/advanced-encryption-standard-aes</loc></url>
  <url><loc>https://deckr.io/term/advanced-encryption-standard-256-aes-256</loc></url>
  <url><loc>https://deckr.io/term/artificial-intelligence-ai</loc></url>
  <url><loc>https://deckr.io/term/annualized-loss-expectancy-ale</loc></url>
  <url><loc>https://deckr.io/term/access-point-ap</loc></url>
  <url><loc>https://deckr.io/term/application-programming-interface-api</loc></url>
  <url><loc>https://deckr.io/term/annualized-rate-of-occurrence-aro</loc></url>
  <url><loc>https://deckr.io/term/address-resolution-protocol-arp</loc></url>
  <url><loc>https://deckr.io/term/address-space-layout-randomization-aslr</loc></url>
  <url><loc>https://deckr.io/term/mitre-attck</loc></url>
  <url><loc>https://deckr.io/term/acceptable-use-policy-aup</loc></url>
  <url><loc>https://deckr.io/term/antivirus-anti-malware</loc></url>
  <url><loc>https://deckr.io/term/bourne-again-shell-bash</loc></url>
  <url><loc>https://deckr.io/term/business-continuity-planning</loc></url>
  <url><loc>https://deckr.io/term/business-impact-analysis</loc></url>
  <url><loc>https://deckr.io/term/bring-your-own-device</loc></url>
  <url><loc>https://deckr.io/term/certificate-authority-ca</loc></url>
  <url><loc>https://deckr.io/term/cloud-access-security-broker-casb</loc></url>
  <url><loc>https://deckr.io/term/cipher-block-chaining-cbc</loc></url>
  <url><loc>https://deckr.io/term/closed-circuit-television-cctv</loc></url>
  <url><loc>https://deckr.io/term/computer-emergency-response-team-cert</loc></url>
  <url><loc>https://deckr.io/term/challenge-handshake-authentication-protocol-chap</loc></url>
  <url><loc>https://deckr.io/term/chief-information-officer-cio</loc></url>
  <url><loc>https://deckr.io/term/computer-incident-response-team-cirt</loc></url>
  <url><loc>https://deckr.io/term/corporate-owned-personally-enabled-cope</loc></url>
  <url><loc>https://deckr.io/term/contingency-planning</loc></url>
  <url><loc>https://deckr.io/term/certificate-revocation-list-crl</loc></url>
  <url><loc>https://deckr.io/term/chief-security-officer-cso</loc></url>
  <url><loc>https://deckr.io/term/cloud-service-provider</loc></url>
  <url><loc>https://deckr.io/term/cross-site-request-forgery-csrf</loc></url>
  <url><loc>https://deckr.io/term/chief-technology-officer-cto</loc></url>
  <url><loc>https://deckr.io/term/common-vulnerabilities-and-exposures-cve</loc></url>
  <url><loc>https://deckr.io/term/common-vulnerability-scoring-system-cvss</loc></url>
  <url><loc>https://deckr.io/term/discretionary-access-control-dac</loc></url>
  <url><loc>https://deckr.io/term/dynamic-host-configuration-protocol-dhcp</loc></url>
  <url><loc>https://deckr.io/term/domain-name-system-dns</loc></url>
  <url><loc>https://deckr.io/term/disaster-recovery-plan-drp</loc></url>
  <url><loc>https://deckr.io/term/endpoint-detection-and-response-edr</loc></url>
  <url><loc>https://deckr.io/term/full-disk-encryption-fde</loc></url>
  <url><loc>https://deckr.io/term/file-system-access-control-list-facl</loc></url>
  <url><loc>https://deckr.io/term/file-integrity-management-fim</loc></url>
  <url><loc>https://deckr.io/term/file-transfer-protocol-ftp</loc></url>
  <url><loc>https://deckr.io/term/ftps-ftp-over-tls</loc></url>
  <url><loc>https://deckr.io/term/secure-file-transfer-protocol-sftp</loc></url>
  <url><loc>https://deckr.io/term/gdpr</loc></url>
  <url><loc>https://deckr.io/term/group-policy-object-gpo</loc></url>
  <url><loc>https://deckr.io/term/global-positioning-system-gps</loc></url>
  <url><loc>https://deckr.io/term/high-availability-ha</loc></url>
  <url><loc>https://deckr.io/term/host-based-intrusion-detection-system-hids</loc></url>
  <url><loc>https://deckr.io/term/host-based-intrusion-prevention-system-hips</loc></url>
  <url><loc>https://deckr.io/term/hardware-security-module-hsm</loc></url>
  <url><loc>https://deckr.io/term/identity-and-access-management-iam</loc></url>
  <url><loc>https://deckr.io/term/indicators-of-compromise-ioc</loc></url>
  <url><loc>https://deckr.io/term/internet-protocol-security-ipsec</loc></url>
  <url><loc>https://deckr.io/term/international-organization-for-standardization-iso</loc></url>
  <url><loc>https://deckr.io/term/layer-2-tunneling-protocol-l2tp</loc></url>
  <url><loc>https://deckr.io/term/local-area-network-lan</loc></url>
  <url><loc>https://deckr.io/term/metropolitan-area-network-man</loc></url>
  <url><loc>https://deckr.io/term/network-types</loc></url>
  <url><loc>https://deckr.io/term/network-topologies</loc></url>
  <url><loc>https://deckr.io/term/md5</loc></url>
  <url><loc>https://deckr.io/term/data-encryption-standard-des</loc></url>
  <url><loc>https://deckr.io/term/dynamic-link-library-dll</loc></url>
  <url><loc>https://deckr.io/term/data-loss-prevention-dlp</loc></url>
  <url><loc>https://deckr.io/term/denial-of-service-dos</loc></url>
  <url><loc>https://deckr.io/term/risk-management</loc></url>
  <url><loc>https://deckr.io/term/threat-modeling</loc></url>
  <url><loc>https://deckr.io/term/attack-surface</loc></url>
  <url><loc>https://deckr.io/term/vulnerability-management</loc></url>
  <url><loc>https://deckr.io/term/patch-management</loc></url>
  <url><loc>https://deckr.io/term/defense-in-depth</loc></url>
  <url><loc>https://deckr.io/term/least-trust</loc></url>
  <url><loc>https://deckr.io/term/least-privilege</loc></url>
  <url><loc>https://deckr.io/term/multi-factor-authentication-mfa</loc></url>
  <url><loc>https://deckr.io/term/cryptography</loc></url>
  <url><loc>https://deckr.io/term/symmetric-encryption</loc></url>
  <url><loc>https://deckr.io/term/asymmetric-encryption</loc></url>
  <url><loc>https://deckr.io/term/hashing</loc></url>
  <url><loc>https://deckr.io/term/salting</loc></url>
  <url><loc>https://deckr.io/term/digital-signatures</loc></url>
  <url><loc>https://deckr.io/term/secure-boot</loc></url>
  <url><loc>https://deckr.io/term/endpoint-security</loc></url>
  <url><loc>https://deckr.io/term/extended-detection-and-response-xdr</loc></url>
  <url><loc>https://deckr.io/term/security-orchestration-automation-and-response-soar</loc></url>
  <url><loc>https://deckr.io/term/intrusion-detection-system-ids</loc></url>
  <url><loc>https://deckr.io/term/intrusion-prevention-system-ips</loc></url>
  <url><loc>https://deckr.io/term/network-security</loc></url>
  <url><loc>https://deckr.io/term/web-application-firewall-waf</loc></url>
  <url><loc>https://deckr.io/term/proxy</loc></url>
  <url><loc>https://deckr.io/term/reverse-proxy</loc></url>
  <url><loc>https://deckr.io/term/network-segmentation</loc></url>
  <url><loc>https://deckr.io/term/microsegmentation</loc></url>
  <url><loc>https://deckr.io/term/secure-remote-access</loc></url>
  <url><loc>https://deckr.io/term/botnet</loc></url>
  <url><loc>https://deckr.io/term/dns-security</loc></url>
  <url><loc>https://deckr.io/term/spyware</loc></url>
  <url><loc>https://deckr.io/term/trojan</loc></url>
  <url><loc>https://deckr.io/term/worm</loc></url>
  <url><loc>https://deckr.io/term/rootkit</loc></url>
  <url><loc>https://deckr.io/term/keylogger</loc></url>
  <url><loc>https://deckr.io/term/spear-phishing</loc></url>
  <url><loc>https://deckr.io/term/whaling</loc></url>
  <url><loc>https://deckr.io/term/smishing</loc></url>
  <url><loc>https://deckr.io/term/vishing</loc></url>
  <url><loc>https://deckr.io/term/social-engineering</loc></url>
  <url><loc>https://deckr.io/term/credential-stuffing</loc></url>
  <url><loc>https://deckr.io/term/brute-force</loc></url>
  <url><loc>https://deckr.io/term/password-spraying</loc></url>
  <url><loc>https://deckr.io/term/man-in-the-middle-mitm</loc></url>
  <url><loc>https://deckr.io/term/session-hijacking</loc></url>
  <url><loc>https://deckr.io/term/replay-attack</loc></url>
  <url><loc>https://deckr.io/term/supply-chain-attack</loc></url>
  <url><loc>https://deckr.io/term/insider-threat</loc></url>
  <url><loc>https://deckr.io/term/data-exfiltration</loc></url>
  <url><loc>https://deckr.io/term/backup-and-recovery</loc></url>
  <url><loc>https://deckr.io/term/incident-response-ir</loc></url>
  <url><loc>https://deckr.io/term/master-service-agreement-msa</loc></url>
  <url><loc>https://deckr.io/term/mean-time-between-failures-mtbf</loc></url>
  <url><loc>https://deckr.io/term/mean-time-to-failure-mttf</loc></url>
  <url><loc>https://deckr.io/term/mean-time-to-recover-mttr</loc></url>
  <url><loc>https://deckr.io/term/network-access-control-nac</loc></url>
  <url><loc>https://deckr.io/term/threat-intelligence</loc></url>
  <url><loc>https://deckr.io/term/kill-chain</loc></url>
  <url><loc>https://deckr.io/term/malware-analysis</loc></url>
  <url><loc>https://deckr.io/term/red-team</loc></url>
  <url><loc>https://deckr.io/term/blue-team</loc></url>
  <url><loc>https://deckr.io/term/purple-team</loc></url>
  <url><loc>https://deckr.io/term/eap</loc></url>
  <url><loc>https://deckr.io/term/ecc</loc></url>
  <url><loc>https://deckr.io/term/efs-encrypted-file-system</loc></url>
  <url><loc>https://deckr.io/term/idp-identity-provider</loc></url>
  <url><loc>https://deckr.io/term/ieee-institute-of-electrical-and-electronics-engineers</loc></url>
  <url><loc>https://deckr.io/term/iot-internet-of-things</loc></url>
  <url><loc>https://deckr.io/term/irp-incident-response-plan</loc></url>
  <url><loc>https://deckr.io/term/osint</loc></url>
</urlset>