<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyber-engineer.de/2025/08/29/from-cve-to-euvd-europes-cybersecurity-evolution/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/11-iot_1.jpg</image:loc><image:title>11-iot_1</image:title><image:caption>Internet of things concept. Idea of smart wireless electronics. Modern global technology. Connection between devices and house appliances. Isolated flat vector illustration</image:caption></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/4-cyber-engineer-sumeyye-unver-it-security-enisa-it-losung-sicherheit.png</image:loc><image:title>4-cyber-engineer-sumeyye-unver-IT-Security-Enisa-IT-Losung-Sicherheit</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/3-cyber-engineer-sumeyye-unver-it-security-enisa-it-losung-sicherheit.jpg</image:loc><image:title>Business concept on white and grey background side view. hand pulling or placing wooden cube.</image:title><image:caption>Business concept on white and grey background side view. hand pulling or placing wooden cube.</image:caption></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/enisa-freepik.jpg</image:loc><image:title>Enisa-freepik</image:title></image:image><lastmod>2025-08-29T16:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2025/08/29/praktische-tipps-fur-linux-sicherheit/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/screenshot-2025-08-29-151052.png</image:loc><image:title>Screenshot 2025-08-29 151052</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/213022-p058c4-370.jpg</image:loc><image:title>213022-P058C4-370</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/programming-background-with-person-working-with-codes-computer.jpg</image:loc><image:title>programming-background-with-person-working-with-codes-computer</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/08/professional-programmer-working-late-dark-office.jpg</image:loc><image:title>Working late</image:title><image:caption>Programmer working at IT company office late at night</image:caption></image:image><lastmod>2025-08-29T13:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2025/06/13/warum-sagt-danke-plotzlich-ein-umweltproblem/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/06/das-von-ai-erzeugte-wasserbild.jpg</image:loc><image:title>das-von-ai-erzeugte-wasserbild</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2025/06/klarglas-mit-wasser.jpg</image:loc><image:title>klarglas-mit-wasser</image:title></image:image><lastmod>2025-06-13T10:28:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/about/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/12/tempimagema93g9.jpg</image:loc><image:title>tempImageMA93g9</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/12/tempimageuqnl3q.jpg</image:loc><image:title>tempImageUqNL3Q</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-06-at-18.05.02-1.png</image:loc><image:title>Screenshot 2024-10-06 at 18.05.02</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-06-at-18.05.02.png</image:loc><image:title>Screenshot 2024-10-06 at 18.05.02</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/comptia_security_2bce.png</image:loc><image:title>CompTIA_Security_2Bce</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/screenshot-2024-03-27-at-11.16.56.png</image:loc><image:title>screenshot-2024-03-27-at-11.16.56</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/screenshot-2024-03-27-at-11.17.10.png</image:loc><image:title>screenshot-2024-03-27-at-11.17.10</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/screenshot-2024-03-27-at-11.16.47.png</image:loc><image:title>screenshot-2024-03-27-at-11.16.47</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/fortinet-fortigate-7-4-operator.png</image:loc><image:title>fortinet-fortigate-7-4-operator</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre-3.png</image:loc><image:title>cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre-3</image:title></image:image><lastmod>2025-02-06T08:22:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-engineer.de/2024/12/10/die-analyse-ki-bias-oder-nie/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/12/tempimage0gsq1n.jpg</image:loc><image:title>tempImage0GsQ1N</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/12/tempimagen0wi4g.jpg</image:loc><image:title>tempImagen0Wi4G</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/12/tempimageywirgo.jpg</image:loc><image:title>tempImageYWirGO</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/12/tempimage3r06yx.jpg</image:loc><image:title>tempImage3r06yx</image:title></image:image><lastmod>2024-12-10T14:08:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/contact/</loc><lastmod>2024-11-03T16:02:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-engineer.de/2023/10/25/global-data-breach/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/screenshot-2024-10-18-at-04.22.06.png</image:loc><image:title>Screenshot 2024-10-18 at 04.22.06</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/cyber_security_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_security_co.png</image:loc><image:title>cyber_security_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_security_co</image:title></image:image><lastmod>2024-10-18T02:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/fotos-ii/</loc><lastmod>2024-10-18T02:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/fotos-i/</loc><lastmod>2024-10-18T02:13:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/illustrationen-i/</loc><lastmod>2024-10-18T02:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/mandala-i-2/</loc><lastmod>2024-10-18T02:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/mandala-ii/</loc><lastmod>2024-10-18T02:12:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/illustration-iii/</loc><lastmod>2024-10-18T02:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/illustration-vi/</loc><lastmod>2024-10-18T02:11:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/illustration-v/</loc><lastmod>2024-10-18T02:10:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/illustration-vi-2/</loc><lastmod>2024-10-18T02:09:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/illustration-melek-taus/</loc><lastmod>2024-10-18T02:08:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/portfolio-zwischen-2000-2008/</loc><lastmod>2024-10-18T02:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/portfolio-zwischen-2000-2008-2/</loc><lastmod>2024-10-18T02:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/12/portfolio-zwischen-2000-2008-3/</loc><lastmod>2024-10-18T02:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2021/05/20/die-hauptbroschure-der-weintegrate-e-v/</loc><lastmod>2024-10-18T02:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2022/05/06/politische-poster-fur-campus-asyl/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2022/05/screen-shot-2022-05-06-at-03.11.53.png</image:loc><image:title>screen-shot-2022-05-06-at-03.11.53</image:title></image:image><lastmod>2024-10-18T02:01:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/03/08/fahrrad-tattoo/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/img_20221023_201147_517.webp</image:loc><image:title>img_20221023_201147_517</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/img_20221023_201147_488.webp</image:loc><image:title>img_20221023_201147_488</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/img_20221023_201147_438.webp</image:loc><image:title>img_20221023_201147_438</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/img_20220720_174431_165.webp</image:loc><image:title>img_20220720_174431_165</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/img_20220720_174431_290.webp</image:loc><image:title>img_20220720_174431_290</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/img_20220720_174431_203.webp</image:loc><image:title>img_20220720_174431_203</image:title></image:image><lastmod>2024-10-18T01:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/10/17/google-dorking-sicherheitsinformationen-effizient-finden/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/google-dork-ii.png</image:loc><image:title>Google Dork-II</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/google-dork-i.png</image:loc><image:title>Google Dork-I</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-17-at-20.38.26.png</image:loc><image:title>Screenshot 2024-10-17 at 20.38.26</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-17-at-20.37.41.png</image:loc><image:title>Screenshot 2024-10-17 at 20.37.41</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-17-at-20.12.32.png</image:loc><image:title>Screenshot 2024-10-17 at 20.12.32</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-17-at-20.12.09-1.png</image:loc><image:title>Screenshot 2024-10-17 at 20.12.09</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-17-at-20.12.09.png</image:loc><image:title>Screenshot 2024-10-17 at 20.12.09</image:title></image:image><lastmod>2024-10-17T19:00:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/10/14/die-macht-von-ki-beim-finden-seltener-daten/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-14-at-02.22.13.png</image:loc><image:title>Screenshot 2024-10-14 at 02.22.13</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/army-soldier-reviews-targets-satellite-world-map-ensure-global-protection.jpg</image:loc><image:title>Army soldier reviews targets on satellite world map to ensure global protection</image:title><image:caption>Army soldier reviews targets on a satellite world map to ensure global protection, works on tablet in military command center. Private examines battlefield data for intelligence. Close up. Camera B.</image:caption></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-14-at-01.53.05-1.png</image:loc><image:title>Screenshot 2024-10-14 at 01.53.05</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/trooper-monitors-chroma-key-mockup-display-laptop-general-headquarters.jpg</image:loc><image:title>Intelligence analyst technician coordinating air support to provide assistance</image:title><image:caption>Intelligence analyst technician coordinating air support to provide assistance for ground troops, ensures correct functioning for future warfare operations. Works in reconnaissance control room.</image:caption></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-14-at-01.53.05.png</image:loc><image:title>Screenshot 2024-10-14 at 01.53.05</image:title></image:image><lastmod>2024-10-14T00:22:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/10/01/die-verfassung-der-kunstlichen-intelligenz-mit-hilfe-ki-vorzubereiten/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-01-at-16.20.54.png</image:loc><image:title>Screenshot 2024-10-01 at 16.20.54</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-01-at-16.18.43.png</image:loc><image:title>Screenshot 2024-10-01 at 16.18.43</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-01-at-16.02.20.png</image:loc><image:title>Screenshot 2024-10-01 at 16.02.20</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/10/screenshot-2024-10-01-at-15.58.04.png</image:loc><image:title>Screenshot 2024-10-01 at 15.58.04</image:title></image:image><lastmod>2024-10-01T14:55:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/09/30/de-live-cyb-threat-karte-von-c-point/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/live-cyber-threat-map.png</image:loc><image:title>LIVE CYBER THREAT MAP</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/screenshot-2024-09-30-at-19.27.24.png</image:loc><image:title>Screenshot 2024-09-30 at 19.27.24</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/screenshot-2024-09-30-at-19.28.34.png</image:loc><image:title>Screenshot 2024-09-30 at 19.28.34</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/screenshot-2024-09-30-at-19.29.34.png</image:loc><image:title>Screenshot 2024-09-30 at 19.29.34</image:title></image:image><lastmod>2024-09-30T18:56:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/09/29/irische-datenschutzkommission-verhangt-geldstrafe-von-91-millionen-euro-gegen-meta-ireland/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/screenshot-2024-09-29-at-22.10.08.png</image:loc><image:title>Screenshot 2024-09-29 at 22.10.08</image:title></image:image><lastmod>2024-09-29T20:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/09/24/kostenlos-ki-platform/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/screenshot-2024-09-24-at-01.56.34.png</image:loc><image:title>Screenshot 2024-09-24 at 01.56.34</image:title></image:image><lastmod>2024-09-23T23:58:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/09/21/artikel-der-krieg-um-daten-macht-kontrolle-und-die-zukunft-der-digitalen-welt/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/financial-data.jpg</image:loc><image:title>Financial Data</image:title><image:caption>Financial Data</image:caption></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/suemeyye-uenver-cybersecurity-itsec-deutschland.jpg</image:loc><image:title>Data center room tunnel with neon light glow.</image:title><image:caption>Data center room tunnel with neon blue and green light glow. Realistic 3d vector illustration of abstract computer server cluster for digital information and database warehouse. Cyberspace banner.</image:caption></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/closeup-complex-circuit-board-with-red-hue.jpg</image:loc><image:title>Close-up of a complex circuit board with a red hue.</image:title><image:caption>Close-up of a complex circuit board with a red hue.</image:caption></image:image><lastmod>2024-09-21T19:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/09/13/1635/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre.png</image:loc><image:title>Cybersecurity, SIEM, SOC Analyst, Comptia, firewall, penetrationtest, nmap, linux, wireshark, incidence-response, splunk, Suemeyye_Uenver_SuemeyyeUenver_Information Technology, IT_ Backdoors and Breaches_B&amp;B_2_11_SuemeyyeUenver_THM__Cyberengineer-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre.jpg</image:loc><image:title>Cybersecurity, SIEM, SOC Analyst, Comptia, firewall, penetrationtest, nmap, linux, wireshark, incidence-response, splunk, Suemeyye_Uenver_SuemeyyeUenver_Information Technology, IT_ Backdoors and Breaches_B&amp;B_2_11_SuemeyyeUenver_THM__Cyberengineer-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/09/20240913_115242.jpg</image:loc><image:title>20240913_115242</image:title></image:image><lastmod>2024-09-13T19:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/07/27/linux-netzwerkgrundlagen-und-sicherheit-lpic-1-102-von-tom-wechsler/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.08.41.png</image:loc><image:title>Screenshot 2024-07-27 at 04.08.41</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.02.42.png</image:loc><image:title>Screenshot 2024-07-27 at 04.02.42</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.02.46.png</image:loc><image:title>Screenshot 2024-07-27 at 04.02.46</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-03.52.01.png</image:loc><image:title>Screenshot 2024-07-27 at 03.52.01</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.03.55.png</image:loc><image:title>Screenshot 2024-07-27 at 04.03.55</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.08.27.png</image:loc><image:title>Screenshot 2024-07-27 at 04.08.27</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-03.52.50.png</image:loc><image:title>Screenshot 2024-07-27 at 03.52.50</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.12.18.png</image:loc><image:title>Screenshot 2024-07-27 at 04.12.18</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.06.18.png</image:loc><image:title>Screenshot 2024-07-27 at 04.06.18</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/07/screenshot-2024-07-27-at-04.05.04.png</image:loc><image:title>Screenshot 2024-07-27 at 04.05.04</image:title></image:image><lastmod>2024-08-09T08:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/01/27/use-case-fake-page-in-a-bank/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/cs-1.jpg</image:loc><image:title>cs-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/cs-2.jpg</image:loc><image:title>cs-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/real-12.png</image:loc><image:title>real-12</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/real-13.png</image:loc><image:title>real-13</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/fake-1.png</image:loc><image:title>fake-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/real-11.png</image:loc><image:title>real-11</image:title></image:image><lastmod>2024-06-14T00:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/04/03/warum-ist-phishing-angriffe-so-popular/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/04/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre-3.png</image:loc><image:title>cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre-3</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/04/iotcybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-.png</image:loc><image:title>iotcybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-</image:title></image:image><lastmod>2024-06-14T00:28:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/03/29/sweet-deception-how-honeypots-honeyfiles-and-honeynets-help-secure-your-systems/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/honeypot-sample-3.png</image:loc><image:title>honeypot-sample-3</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/honeypotserver-sample-4.png</image:loc><image:title>honeypotserver-sample-4</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/honeypot-sample-1.png</image:loc><image:title>honeypot-sample-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/honeypotserver-sample-2.png</image:loc><image:title>honeypotserver-sample-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/suemeyyeuenver-cybersecurity-iam-ad-deutschland.jpg</image:loc><image:title>Bees  On Honeycombs Vector Illustration</image:title><image:caption>Honey realistic abstract composition with bees sitting on amber honeycombs vector illustration SSUCv3H4sIAAAAAAACA01Ry04DMQz8FcvnFQVx2xuHiocEquDAoeLgTczWajap4uyWqtp/x+lDcLPH4/FkcsSOVBy2R5QQRi2ZiqSI7V2D7KWkLBSwvZ0b1EJlVFbjWueocG/TU38VWR8rji0+RBko6OJTgg/yzWjrY2eD56jsiuLcXKlvppr/CK+ijkOgyGk02leD1HN0h3rVzmYOTCcTaxtt94XzcHE0ied0Lmn0UkuckjMb2N5Xx/a6NFS0z7TbiMsyca69Z3VW4FOKfIDMFESLOKCu5uEKuDTskkpNBvZSNtAxKxhQJPZgIA0dZ9jUfeN2CpO9MmX4n+kNLC1Q6gLDcvUBFD28c/S2JxFeVo/wnfJgkTRYfmow2FwSOmvpwrNLVWriRUdu2+c0Rq9GS1v7r3mefwE0T/VezQEAAA==</image:caption></image:image><lastmod>2024-06-14T00:26:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/02/23/konzept-der-authentifizierung-iam/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre.jpg</image:loc><image:title>cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-and-bre</image:title></image:image><lastmod>2024-06-14T00:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/05/14/sehr-spannend-und-faszinierend-welt/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/binary-code-background.jpg</image:loc><image:title>binary-code-background</image:title></image:image><lastmod>2024-09-01T11:30:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/05/07/spam-von-jira-uber-atlassian/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/atlassian-jira-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbre-1.png</image:loc><image:title>atlassian-jira-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbre-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbrea-1.png</image:loc><image:title>cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbrea-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/3829154.jpg</image:loc><image:title>3829154</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/3840476.jpg</image:loc><image:title>3840476</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/atlassian-jira-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbre.png</image:loc><image:title>atlassian-jira-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbre</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/05/cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbrea.png</image:loc><image:title>cybersecurity-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it_-backdoors-andbrea</image:title></image:image><lastmod>2024-05-07T18:33:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/03/30/spas-ich-bin-cybersicherheit-specialist-wie-ware-es-mit-ihnen/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/comtiasecplus-suemeyyeuenver-comptia-pruefung-personalitytest-1.png</image:loc><image:title>comtiasecplus-suemeyyeuenver-comptia-pruefung-personalitytest-1</image:title></image:image><lastmod>2024-03-30T15:56:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/12/30/iso27001/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-02.49.30.png</image:loc><image:title>screenshot-2023-12-30-at-02.49.30</image:title></image:image><lastmod>2024-03-30T14:33:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/14/wenn-cyber-sich-mit-punk-trifft-von-deathburger-josangonzalez/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-1.png</image:loc><image:title>jason-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-2.png</image:loc><image:title>jason-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-4.png</image:loc><image:title>jason-4</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-3.png</image:loc><image:title>jason-3</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-5.png</image:loc><image:title>jason-5</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-6.png</image:loc><image:title>jason-6</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-7.png</image:loc><image:title>jason-7</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-8.png</image:loc><image:title>jason-8</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/jason-fin.png</image:loc><image:title>jason-fin</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/screenshot-2024-03-30-at-04.03.44.png</image:loc><image:title>screenshot-2024-03-30-at-04.03.44</image:title></image:image><lastmod>2024-03-30T03:18:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/03/30/was-ist-das-try-hack-me-%f0%9f%98%8f/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/screenshot-2024-03-30-at-03.33.32.png</image:loc><image:title>screenshot-2024-03-30-at-03.33.32</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/wireshark-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam.png</image:loc><image:title>wireshark-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/owasp10-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam.png</image:loc><image:title>owasp10-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/metasploit-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam.png</image:loc><image:title>metasploit-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/03/cat-linux-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam.png</image:loc><image:title>cat-linux-ci-cd-suemeyyeuenver-suemeyye-uenver-cybersecurity-specialist-cloud-ad-iam</image:title></image:image><lastmod>2024-03-30T02:37:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/02/06/iso-iec-20000-1/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/06022024_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-sap-iso.png</image:loc><image:title>06022024_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-sap-iso</image:title></image:image><lastmod>2024-03-30T01:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/01/14/microsoft-sql-server-powershell/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/sql_suemeyye_uenver_abschlusszertifikat_sql-azure-grundkurs-1.png</image:loc><image:title>sql_suemeyye_uenver_abschlusszertifikat_sql-azure-grundkurs-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_7.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_7</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_6.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_6</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_9.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_9</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_4.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_4</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_16.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_16</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_12.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_12</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_1.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_15.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_15</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_3.png</image:loc><image:title>microsoft-sql-server-powershell_linux_linkedin_suemeyye_uenver_3</image:title></image:image><lastmod>2024-03-30T00:49:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/02/07/google-cloud-gen-ai/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.40.21.png</image:loc><image:title>screenshot-2024-02-06-at-23.40.21</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.46.14.png</image:loc><image:title>screenshot-2024-02-06-at-23.46.14</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.46.21.png</image:loc><image:title>screenshot-2024-02-06-at-23.46.21</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-07-at-00.05.00.png</image:loc><image:title>screenshot-2024-02-07-at-00.05.00</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.49.36.png</image:loc><image:title>screenshot-2024-02-06-at-23.49.36</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-07-at-00.05.31.png</image:loc><image:title>screenshot-2024-02-07-at-00.05.31</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.51.43.png</image:loc><image:title>screenshot-2024-02-06-at-23.51.43</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.53.56.png</image:loc><image:title>screenshot-2024-02-06-at-23.53.56</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.52.56.png</image:loc><image:title>screenshot-2024-02-06-at-23.52.56</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/screenshot-2024-02-06-at-23.50.38.png</image:loc><image:title>screenshot-2024-02-06-at-23.50.38</image:title></image:image><lastmod>2024-03-29T22:57:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/02/06/aws-ressourcen-zu-schutzen-best-practices-fur-aws-identity-and-access-management-iam/</loc><lastmod>2024-02-06T15:05:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/02/06/sap-identity-management/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/02/06022024_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-sap.png</image:loc><image:title>06022024_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-sap</image:title></image:image><lastmod>2024-02-06T11:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/01/25/diary-meinung-ansichten/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/zeit-in-china-war-es-eine-der-bezauberndsten-erfahrungen-menschen-bei-synchronen-qigong-sitzungen-direkt.png</image:loc><image:title>zeit-in-china-war-es-eine-der-bezauberndsten-erfahrungen-menschen-bei-synchronen-qigong-sitzungen-direkt</image:title></image:image><lastmod>2024-01-25T07:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/01/15/scrum-master-notes-15-01-2024-%f0%9f%98%a9/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_2_suemeyyeuenver_4.png</image:loc><image:title>scrum_master_2_suemeyyeuenver_4</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_2_suemeyyeuenver_3.png</image:loc><image:title>scrum_master_2_suemeyyeuenver_3</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_2_suemeyyeuenver_2.png</image:loc><image:title>scrum_master_2_suemeyyeuenver_2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_2_suemeyyeuenver_1.png</image:loc><image:title>scrum_master_2_suemeyyeuenver_1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_suemeyye_uenver.png</image:loc><image:title>scrum_master_suemeyye_uenver</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_suemeyyeuenver_2.png</image:loc><image:title>scrum_master_suemeyyeuenver_2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_suemeyyeuenver_3.png</image:loc><image:title>scrum_master_suemeyyeuenver_3</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_suemeyyeuenver_4.png</image:loc><image:title>scrum_master_suemeyyeuenver_4</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_suemeyyeuenver_1.png</image:loc><image:title>scrum_master_suemeyyeuenver_1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/scrum_master_suemeyye_uenver_2.png</image:loc><image:title>scrum_master_suemeyye_uenver_2</image:title></image:image><lastmod>2024-01-15T04:05:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/01/07/bylock-a-legal-app-until-2016-transformed-into-illegality-overnight/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/screenshot-2024-01-07-at-13.07.13.png</image:loc><image:title>screenshot-2024-01-07-at-13.07.13</image:title></image:image><lastmod>2024-01-07T12:29:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2024/01/05/was-ist-ssrf/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy-1.png</image:loc><image:title>02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2024/01/02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy.png</image:loc><image:title>02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy</image:title></image:image><lastmod>2024-01-04T23:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/blog/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-03-05-at-00.38.25.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.25</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-03-05-at-00.38.01.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.01</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/facebook_es_940x788.png</image:loc><image:title>facebook_es_940x788</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/blau_version.png</image:loc><image:title>blau_version</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/honorarvertrag.png</image:loc><image:title>honorarvertrag</image:title></image:image><lastmod>2023-12-30T01:24:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-engineer.de/2023/12/30/python-basics-im-thm/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-01.46.43.png</image:loc><image:title>screenshot-2023-12-30-at-01.46.43</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-01.43.22.png</image:loc><image:title>screenshot-2023-12-30-at-01.43.22</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/bitcointousd-with-two-parameters-bitcoin_amount-the-amount-of-bitcoin-you-own-and-bitcoin_value_usd_thm_suemeyyeuenver.png</image:loc><image:title>bitcointousd-with-two-parameters-bitcoin_amount-the-amount-of-bitcoin-you-own-and-bitcoin_value_usd_thm_suemeyyeuenver</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-01.37.27.png</image:loc><image:title>screenshot-2023-12-30-at-01.37.27</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-01.26.12.png</image:loc><image:title>screenshot-2023-12-30-at-01.26.12</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-01.17.13.png</image:loc><image:title>screenshot-2023-12-30-at-01.17.13</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/screenshot-2023-12-30-at-01.08.09.png</image:loc><image:title>screenshot-2023-12-30-at-01.08.09</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy-1.png</image:loc><image:title>02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy.png</image:loc><image:title>02122023_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenver_information-technology-it-suemeyy</image:title></image:image><lastmod>2023-12-30T00:49:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/12/02/kiron-academy-thrive-program/</loc><lastmod>2023-12-02T22:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/12/02/backdoors-breaches/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/cyber_security_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_security_co-1.png</image:loc><image:title>cyber_security_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_security_co-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/cyber_security_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_security_co-2.png</image:loc><image:title>cyber_security_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_security_co-2</image:title></image:image><lastmod>2023-12-02T20:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/portfolio-fur-das-zertifikat/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/cyber_security_specialist_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_-4.png</image:loc><image:title>cyber_security_specialist_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_-4</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/cyber_security_specialist_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_-3.png</image:loc><image:title>cyber_security_specialist_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_-3</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/cybersecurity-firewall-nmap-linux-kalilinux-information-technology-wireshark-confidentially-integrity-availability-11-1.png</image:loc><image:title>cybersecurity-firewall-nmap-linux-kalilinux-information-technology-wireshark-confidentially-integrity-availability-11-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/02122023_ai_ai_generativeai_generative_ai_ki_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenv-2.png</image:loc><image:title>02122023_ai_ai_generativeai_generative_ai_ki_cybersecurity-1-siem-soc-analyst-comptia-firewall-penetrationtest-nmap-linux-wireshark-incidence-response-splunk-suemeyye_uenver_suemeyyeuenv-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/12/cisco_certificate-1.png</image:loc><image:title>cisco_certificate-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/11/cyber_security_specialist_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_.png</image:loc><image:title>cyber_security_specialist_consultant_infosec_awareness_officer_junior_penetration_tester_assurance_officer_grc_consultant_siem_engineer_data_project_manager_soc_analyst_junior_offensive_</image:title></image:image><lastmod>2023-12-02T20:41:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-engineer.de/2023/10/24/iso-iec-270012022-information-security-associate/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/cybersecurity-firewall-nmap-linux-kalilinux-information-technology-wireshark-confidentially-integrity-availability-11.png</image:loc><image:title>cybersecurity-firewall-nmap-linux-kalilinux-information-technology-wireshark-confidentially-integrity-availability-11</image:title></image:image><lastmod>2023-10-27T00:59:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/27/nmap-live-host-discovery/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/screenshot-2023-10-27-at-02.47.36.png</image:loc><image:title>screenshot-2023-10-27-at-02.47.36</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/screenshot-2023-10-27-at-01.51.58.png</image:loc><image:title>screenshot-2023-10-27-at-01.51.58</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/screenshot-2023-10-27-at-01.50.47.png</image:loc><image:title>screenshot-2023-10-27-at-01.50.47</image:title></image:image><lastmod>2023-10-27T00:50:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/27/malware-information-sharing-platform-misp/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/screenshot-2023-10-26-at-23.53.24.png</image:loc><image:title>screenshot-2023-10-26-at-23.53.24</image:title></image:image><lastmod>2023-10-26T22:01:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/14/http-response-status-codes/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/cybersecurity-sumeyyeunver-creditstoryset-.jpg</image:loc><image:title>cybersecurity-sumeyyeunver-creditstoryset-</image:title></image:image><lastmod>2023-10-17T23:03:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/18/worter-zum-thema-cybersicherheit/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/cybersecurity-sumeyyeunver-socanalyst-penetration-testing-creditmacrovector.jpg</image:loc><image:title>Data Protection Concept</image:title><image:caption>Data protection concept with circuit in lock shape on blue background vector illustration</image:caption></image:image><lastmod>2023-10-17T22:59:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/16/falscher-anruf-betrug-mit-ki/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/cybercrime-sumeyyeunver-forensic-cybersecurity-jpg.png</image:loc><image:title>cybercrime-sumeyyeunver-forensic-cybersecurity-jpg</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/cybersecurity-fraud-call-sicherheit-deutschland-sumeyyeunver-bundesamt-cybercrime-creditnakaridore.jpg</image:loc><image:title>Surprised facial expression. Portrait of shocked female lowered</image:title><image:caption>Surprised facial expression. Portrait of shocked female lowered jaw from surprisement, feels stupefied, being impressed by something, holds red wired retro phone. In a white shirt, red suspenders</image:caption></image:image><lastmod>2023-10-16T16:53:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/10/14/social-engineering-in-der-digitalen-und-realen-welt/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/phishing-social-engineering-cybersecurity-soc-analyst-sumeyye-unver-credit-freepik.jpg</image:loc><image:title>phishing-social-engineering-cybersecurity-soc-analyst-sumeyye-unver-credit-freepik</image:title></image:image><lastmod>2023-10-14T17:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/09/07/dns-im-detail-studiennotizen-von-tryhackme-com/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-00.43.26.png</image:loc><image:title>screenshot-2023-09-07-at-00.43.26</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-00.17.58.png</image:loc><image:title>screenshot-2023-09-07-at-00.17.58</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-00.11.49.png</image:loc><image:title>screenshot-2023-09-07-at-00.11.49</image:title></image:image><lastmod>2023-10-14T01:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/wireshark/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.10.16.png</image:loc><image:title>screenshot-2023-09-07-at-02.10.16</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.08.10.png</image:loc><image:title>screenshot-2023-09-07-at-02.08.10</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.06.50.png</image:loc><image:title>screenshot-2023-09-07-at-02.06.50</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.05.32.png</image:loc><image:title>screenshot-2023-09-07-at-02.05.32</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.04.54.png</image:loc><image:title>screenshot-2023-09-07-at-02.04.54</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.04.19.png</image:loc><image:title>screenshot-2023-09-07-at-02.04.19</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.03.24.png</image:loc><image:title>screenshot-2023-09-07-at-02.03.24</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.01.15.png</image:loc><image:title>screenshot-2023-09-07-at-02.01.15</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-02.00.43.png</image:loc><image:title>screenshot-2023-09-07-at-02.00.43</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/09/screenshot-2023-09-07-at-01.59.59.png</image:loc><image:title>screenshot-2023-09-07-at-01.59.59</image:title></image:image><lastmod>2023-10-14T01:13:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-engineer.de/2023/10/13/die-cybersicherheitsbewusstseinsmonat/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/10/sumeyyeunver_cybersicherheit_article_credit-kjpargeter.jpg</image:loc><image:title>3d internet secuirty badge</image:title><image:caption>3d render of an internet security badge</image:caption></image:image><lastmod>2023-10-13T20:49:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/09/07/love-and-order/</loc><lastmod>2023-09-07T21:02:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/09/07/portfolios-zwischen-2000-2008/</loc><lastmod>2023-09-06T23:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/2023/03/08/webseite/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.45.12-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.45.12-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.45.12-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.45.12-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.41.35-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.41.35-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.41.46-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.41.46-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.40.09-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.40.09-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.40.20-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.40.20-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.38.53-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.53-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.38.42-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.42-2</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.37.20-2.png</image:loc><image:title>screenshot-2023-03-05-at-00.37.20-2</image:title></image:image><lastmod>2023-03-08T23:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyber-engineer.de/e-portfolio/</loc><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.42.16-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.42.16-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.41.46-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.41.46-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.41.35.png</image:loc><image:title>screenshot-2023-03-05-at-00.41.35</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.40.33.png</image:loc><image:title>screenshot-2023-03-05-at-00.40.33</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.40.20-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.40.20-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.40.09-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.40.09-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.39.03.png</image:loc><image:title>screenshot-2023-03-05-at-00.39.03</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.38.53-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.53-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.38.42-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.42-1</image:title></image:image><image:image><image:loc>https://cyber-engineer.de/wp-content/uploads/2023/03/screenshot-2023-03-05-at-00.38.31-1.png</image:loc><image:title>screenshot-2023-03-05-at-00.38.31-1</image:title></image:image><lastmod>2023-03-05T00:11:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyber-engineer.de</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-08-29T16:42:14+00:00</lastmod></url></urlset>
