<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://edu.cyberyozh.com/</loc></url><url><loc>https://edu.cyberyozh.com/verification</loc></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh</loc><lastmod>2024-12-14T04:51:46.462863+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-anonimnost-i-bezopasnost-3-0-epoha-deepfake/module-test</loc><lastmod>2026-03-22T14:33:52.268939+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-vvodnyy-modul</loc><lastmod>2025-06-20T11:32:44.686523+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-1-vvedenie-v-kurs-i-pravovye-storony-osint</loc><lastmod>2025-06-21T07:09:58.678338+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-2-metody-sbora-i-hraneniya-informacii</loc><lastmod>2025-06-21T16:41:40.583540+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-3-bezopasnost-pri-rabote-s-dannymi</loc><lastmod>2025-11-13T13:15:45.674647+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-3-socmint-sbor-informacii-iz-socialnyh-setey</loc><lastmod>2025-09-26T08:16:22.899766+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-4-osnovy-konkurentnoy-i-finansovoy-razvedki</loc><lastmod>2025-09-26T08:20:33.794957+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-5-vidovaya-razvedka-imint</loc><lastmod>2025-09-26T08:23:34.589644+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-modul-6-osnovy-kriticheskogo-myshleniya-rassuzhdenie-i-dokazatels</loc><lastmod>2025-09-26T08:25:35.701221+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-osint-kiberdetektiv-2-0/module-itogovyy-proekt</loc><lastmod>2025-09-26T08:27:32.488120+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-vvodnyy-modul</loc><lastmod>2025-08-25T14:04:35.345049+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-start-v-obuchenii</loc><lastmod>2025-08-25T14:41:21.827725+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-1-arhitektura-ms-active-directory</loc><lastmod>2025-09-30T10:10:23.051763+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-1-vvedenie</loc><lastmod>2025-09-30T10:10:11.852390+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-3-razvedka-i-poluchenie-pervonachalnogo-dostupa</loc><lastmod>2025-09-24T18:05:46.757001+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-4-postekspluataciya-lokalnoe-povyshenie-privilegiy-poluchen</loc><lastmod>2025-09-24T18:05:48.810402+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-5-gorizontalnoe-peremeshchenie-i-pivoting</loc><lastmod>2025-09-24T18:05:50.929411+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-6-ataki-na-kerberos</loc><lastmod>2025-09-24T18:05:53.254638+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-7-uyazvimosti-acl</loc><lastmod>2025-09-24T18:05:55.393343+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-8-relay-i-coerce-ataki</loc><lastmod>2025-09-24T18:05:57.430677+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-9-centr-sertifikacii-active-directory</loc><lastmod>2025-09-24T18:05:59.649627+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-10-ataki-na-doveritelnye-otnosheniya-v-domene</loc><lastmod>2025-09-24T18:06:02.190938+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-11-from-zero-to-domain-admin-nizkovisyashchie-frukty</loc><lastmod>2025-09-24T18:06:04.297811+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-12-postekspluataciya-i-zakreplenie-v-domene</loc><lastmod>2025-09-24T18:06:06.849151+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-modul-13-napisanie-otchyota</loc><lastmod>2025-09-24T18:06:09.335608+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-pentest-vnutrenney-infrastruktury-active-directory/module-itogovyy-proekt</loc><lastmod>2025-09-24T18:06:11.697977+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-sql-dlya-hakera/module-modul-1-osnovy-sql-i-rabota-s-bazami-dannyh</loc><lastmod>2025-07-18T09:57:20.190022+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-sql-dlya-hakera/module-modul-2</loc><lastmod>2025-02-05T14:01:43.245716+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-sql-dlya-hakera/module-modul-3</loc><lastmod>2025-01-29T11:44:03.073151+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-sql-dlya-hakera/module-modul-4-bezopasnost-baz-dannyh-i-zashchita-ot-atak</loc><lastmod>2025-01-29T12:35:32.307931+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-sql-dlya-hakera/module-modul-5-postroenie-instrumentov-dlya-raboty-s-sql</loc><lastmod>2025-01-29T12:47:20.222048+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-sql-dlya-hakera/module-modul-6-finalnyy-proekt-i-uglublennye-keysy</loc><lastmod>2025-02-05T13:54:30.716606+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-vvodnyy-modul</loc><lastmod>2025-04-18T09:46:42.540536+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-1-vvedenie-v-kiberbezopasnost</loc><lastmod>2025-05-08T12:54:46.698016+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-3-python-dlya-specialista-ib</loc><lastmod>2025-05-30T08:19:09.087738+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-2-sistemnyy-administrator-linux</loc><lastmod>2025-05-30T08:19:17.526942+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-4-pravovye-aspekty-informacionnoy-bezopasnosti</loc><lastmod>2025-06-21T05:21:47.250342+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-5-osnovy-zashchity-it-infrastruktury</loc><lastmod>2025-06-21T05:29:48.876133+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-6-vvedenie-v-osint-korporativnaya-bezopasnost-i-zashchita-o</loc><lastmod>2025-06-21T05:36:04.673172+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-7-vvedenie-v-pentest</loc><lastmod>2025-06-21T05:43:04.306655+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-8-vvedenie-v-soc-analitiku</loc><lastmod>2025-06-21T05:48:36.284725+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-8-karera-i-trudoustroystvo</loc><lastmod>2025-06-21T05:53:39.601271+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-finalnyy-proekt-kursa</loc><lastmod>2025-05-08T12:55:02.695398+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-10-git-dlya-bezopasnoy-razrabotki</loc><lastmod>2025-06-21T05:53:57.228604+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-specialist-po-kiberbezopasnosti-s-nulya-dlya-jun/module-modul-9-active-directory</loc><lastmod>2025-06-21T05:53:46.017175+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-hacker-point-blue-team-red-team/module-obuchayushchiy-trek</loc><lastmod>2025-10-23T04:08:34.583885+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-chto-takoe-proksi-s-tochki-zreniya-setevoy-arhitektury</loc><lastmod>2024-12-13T17:53:13.807292+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-chto-takoe-asn-kak-on-mozhet-povliyat-na-rabotu</loc><lastmod>2024-12-13T17:55:49.132145+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-vybor-i-pokupka-anonimnogo-proxy</loc><lastmod>2024-12-13T18:03:25.188676+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-mobilnye-rezidentskie-servernye-proksi-kak-eto-rabotaet</loc><lastmod>2026-03-28T18:17:22.081061+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-kak-vybor-strany-proksi-vliyaet-na-reyting-doveriya</loc><lastmod>2024-12-13T17:55:58.223214+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-nastroyka-proxy-na-windows</loc><lastmod>2024-12-14T04:55:27.671882+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-privatnye--i-shared-proksi-chem-opasny-shered-proksi</loc><lastmod>2024-12-13T17:54:41.496213+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-pokazateli-kachestva-proksi-shirina-kanala-i-uptime-ping</loc><lastmod>2024-12-13T17:56:10.080750+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-nastroyka-proxy-na-linux</loc><lastmod>2024-12-13T18:09:50.305008+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-chem-otlichaetsya-ipv4-i-ipv6</loc><lastmod>2024-12-13T17:54:54.001160+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-chto-takoe-fraud-score-ip-kak-on-formiruetsya</loc><lastmod>2024-12-13T17:57:32.871467+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-nastroyka-proxy-na-android</loc><lastmod>2024-12-13T18:12:34.214703+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-proxy-dns-chto-eto-takoe-i-pochemu-eto-vazhno</loc><lastmod>2024-12-13T17:55:00.467869+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-chto-takoe-p0f-fingerprint-v-proksi</loc><lastmod>2024-12-13T17:58:12.772785+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-kak-servisy-detektiruyut-proksi</loc><lastmod>2024-12-13T17:58:27.027255+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-protokol-quic-upd</loc><lastmod>2024-12-13T17:58:38.211921+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/course-proksi-servery-dlya-nachinayushih-ot-app-cyberyozh/video-kak-mtu-vliyaet-na-rabotu-proksi</loc><lastmod>2024-12-13T17:58:50.931963+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-multiakkaunting</loc><lastmod>2025-09-18T18:57:06.351908+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-android</loc><lastmod>2025-11-16T12:06:01.148143+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-anonimnost-i-bezopasnost</loc><lastmod>2025-09-18T18:56:10.952124+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-linux</loc><lastmod>2025-11-16T12:10:02.743097+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-internet-razvedka-osint</loc><lastmod>2025-09-18T17:42:09.135128+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses</loc><lastmod>2025-11-16T12:22:19.047360+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-besplatno</loc><lastmod>2024-12-03T08:35:08.505735+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-kiberbezopasnost-besplatno</loc><lastmod>2025-09-18T19:02:17.853308+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-kiberbezopasnost-trial</loc><lastmod>2025-09-18T17:42:38.644106+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-trial</loc><lastmod>2024-12-03T08:35:08.505735+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-programmirovanie</loc><lastmod>2025-11-16T12:24:43.633383+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-avtomatizaciya</loc><lastmod>2025-11-16T12:23:53.215436+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-etichnyy-haking-pentest</loc><lastmod>2025-09-18T18:55:28.006931+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-multiakkaunting-besplatno</loc><lastmod>2025-09-18T18:57:06.377750+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-internet-razvedka-osint-trial</loc><lastmod>2026-01-23T08:21:29.497853+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-bazy-dannyh</loc><lastmod>2025-11-16T12:26:57.725902+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-kiberbezopasnost</loc><lastmod>2025-09-18T17:42:38.616809+00:00</lastmod></url><url><loc>https://edu.cyberyozh.com/courses/catalog-anonimnost-i-bezopasnost-besplatno</loc><lastmod>2025-09-18T18:56:10.993554+00:00</lastmod></url>
</urlset>
