<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://araunahconsulting.com/sitemap-stylesheet.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://araunahconsulting.com/courses/governance-risk-and-compliance-2/</loc>
    <lastmod>2025-12-31T14:16:08+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Information-security-risk-management-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-engineering-and-cryptography/</loc>
    <lastmod>2025-12-31T14:16:29+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/social-engineering-attacks-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-architecture-2/</loc>
    <lastmod>2025-12-31T14:16:42+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Enterprise-Security-Operations-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/network-troubleshooting/</loc>
    <lastmod>2025-12-31T14:17:53+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Linux-Troubleshooting-and-Diagnostics-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/network-implementations/</loc>
    <lastmod>2025-12-31T14:18:19+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-Performance-Tuning-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/networking-fundamentals/</loc>
    <lastmod>2025-12-31T14:18:30+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2023/10/Networking-Fundamentals.webp</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-assessment-and-testing/</loc>
    <lastmod>2025-12-31T14:18:56+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Compliance-and-Assessment-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/software-development-security/</loc>
    <lastmod>2025-12-31T14:18:41+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Security-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/identity-and-access-management/</loc>
    <lastmod>2025-12-31T14:19:11+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-Performance-Tuning-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/communications-and-network-security/</loc>
    <lastmod>2025-12-31T14:20:46+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Reporting-and-Communication-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-architecture-and-engineering/</loc>
    <lastmod>2025-12-31T14:21:01+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Security-Architecture-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-and-risk-management/</loc>
    <lastmod>2025-12-31T14:21:13+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Software-and-Systems-Security-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/information-security-program-development-and-management/</loc>
    <lastmod>2025-12-31T14:21:40+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Information-Security-Program-Development-and-Management-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-migration-from-oracle-to-postgresql/</loc>
    <lastmod>2025-12-31T14:22:48+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/oracle-to-postgres-top-icon-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-security-and-best-practices/</loc>
    <lastmod>2025-12-31T14:23:20+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL_Security-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-export-import-streaming-replication/</loc>
    <lastmod>2025-12-31T14:23:34+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-ExportImport-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-performance-tuning-pg_upgrade/</loc>
    <lastmod>2025-12-31T14:24:01+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-Performance-Tuning-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-backup-recovery-pitr-data-dictionary/</loc>
    <lastmod>2025-12-31T14:24:15+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-Backup-Recovery-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-tablespaces-table-partitioning/</loc>
    <lastmod>2025-12-31T14:24:29+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/table-part-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-security-routine-maintenance-tasks/</loc>
    <lastmod>2025-12-31T14:24:43+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/routin-mantain-task-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-psql/</loc>
    <lastmod>2025-12-31T14:25:00+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-PSQL-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-creating-and-managing-databases/</loc>
    <lastmod>2025-12-31T14:24:53+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-Creating-and-Managing-Databases-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-database-clusters-and-configuration/</loc>
    <lastmod>2025-12-31T14:25:07+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-–-Database-Clusters-and-Configuration-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresql-dba-installation-system-architecture/</loc>
    <lastmod>2025-12-31T14:26:35+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PostgreSQL-DBA-Installation-System-Architecture-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/blockchain/</loc>
    <lastmod>2025-12-31T14:29:17+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/WHAT-IS-BLOCKCHAIN-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/idm-pam-iam/</loc>
    <lastmod>2025-12-31T14:29:37+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2022/12/Identity-Management.webp</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-architecture/</loc>
    <lastmod>2025-12-31T14:31:05+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Security-Architecture-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/network-design/</loc>
    <lastmod>2025-12-31T14:31:20+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2022/12/Network-Design.webp</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/git-and-github/</loc>
    <lastmod>2025-12-31T14:31:34+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Git-and-Github-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/software-as-a-service/</loc>
    <lastmod>2025-12-31T14:31:48+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Software-as-a-Service-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/platform-as-a-service/</loc>
    <lastmod>2025-12-31T14:31:59+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Platform-as-a-Service-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/infrastructure-as-a-service/</loc>
    <lastmod>2025-12-31T14:32:24+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-operations-and-support-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cloud-cybersecurity/</loc>
    <lastmod>2025-12-31T14:32:33+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-Cybersecurity-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/internet-of-things/</loc>
    <lastmod>2025-12-31T14:32:43+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/internet_of_things_iot-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/social-engineering/</loc>
    <lastmod>2025-12-31T14:32:53+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/social-engineering-attacks-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/exploit-frameworks-exploit-kits/</loc>
    <lastmod>2025-12-31T14:33:05+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/maxresdefault-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cloud-architecture-and-design/</loc>
    <lastmod>2025-12-31T14:35:26+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-Architecture-and-Design-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/web-application-penetration-testing/</loc>
    <lastmod>2025-12-31T14:35:40+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Decoding-Web-Application-Security-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/troubleshooting-to-resolve-cloud-related-issues/</loc>
    <lastmod>2025-12-31T14:34:47+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Troubleshooting-to-resolve-cloud-related-issues.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cloud-operations-and-support/</loc>
    <lastmod>2025-12-31T14:35:15+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-operations-and-support-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/shell-scripting-programming-languages/</loc>
    <lastmod>2025-12-31T14:35:51+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/linha-de-comand-linux-cli-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/enumeration-foot-printing/</loc>
    <lastmod>2025-12-31T14:29:08+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/footprint-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/operations-and-incident-response/</loc>
    <lastmod>2025-12-31T14:36:04+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Operations-and-Incident-Response-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/threats-attacks-and-vulnerabilities/</loc>
    <lastmod>2025-12-31T14:36:16+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Threats-Attacks-and-Vulnerabilities-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/kali-linux-bash-scripting/</loc>
    <lastmod>2025-12-31T14:36:47+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/bash-scripting-on-Kali-Linux-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/mobile-device-hacking/</loc>
    <lastmod>2025-12-31T14:36:55+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/linha-de-comand-linux-cli-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/linux-package-management/</loc>
    <lastmod>2025-12-31T14:38:36+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/packages-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cryptography-and-pki/</loc>
    <lastmod>2025-12-31T14:38:51+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Operations-and-Incident-Response-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/technical-integration-of-enterprise-security/</loc>
    <lastmod>2025-12-31T14:36:35+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/biometric-authentication-og-1-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/software-development-lifecycle-sdlc/</loc>
    <lastmod>2025-12-31T14:39:28+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-Cybersecurity-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/policies-to-mitigate-risk/</loc>
    <lastmod>2025-12-31T14:39:49+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Software-and-Systems-Security-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-orchestration-automation-and-response-soar/</loc>
    <lastmod>2025-12-31T14:39:56+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/6308791eff39793cdf472a22_SOAR-overview-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/incident-response-toolkit/</loc>
    <lastmod>2025-12-31T14:40:04+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/ooda-graphic-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-information-event-management/</loc>
    <lastmod>2025-12-31T14:40:10+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/605cafdf0b5b693ab65e4512_13-превью-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/linux-troubleshooting-and-diagnostics/</loc>
    <lastmod>2025-12-31T14:40:32+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Linux-Troubleshooting-and-Diagnostics-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/hardware-and-system-configuration/</loc>
    <lastmod>2025-12-31T14:40:20+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Hardware-and-System-Configuration-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/vulnerability-scanning/</loc>
    <lastmod>2025-12-31T14:43:47+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/PinClipart.com_time-travel-machine-clip_2363198-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/attacks-and-exploits/</loc>
    <lastmod>2025-12-31T14:40:39+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Attacks-and-Exploits-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/information-gathering-and-vulnerability-scanning/</loc>
    <lastmod>2025-12-31T14:42:08+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Information-Gathering-and-Vulnerability-Scanning-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/identity-and-access-iam/</loc>
    <lastmod>2025-12-31T14:43:56+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/blog-featured-what-is-idm03-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/wireless-networking/</loc>
    <lastmod>2025-12-31T14:44:03+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/0_fsDcLw9CU5hxtTs-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/password-cracking/</loc>
    <lastmod>2025-12-31T14:44:10+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Security-Operations-and-Monitoring-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/exploiting-os/</loc>
    <lastmod>2025-12-31T14:44:18+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/0_fsDcLw9CU5hxtTs-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/osint-and-information-gathering/</loc>
    <lastmod>2025-12-31T14:44:26+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/618d06ad584a54d6dc1fa57e_OSINT-Network-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/package-management-and-repositories/</loc>
    <lastmod>2025-12-31T14:44:33+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/1_94lZ13G7-I5h9Z2T9iSiAg-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/incident-response/</loc>
    <lastmod>2025-12-31T14:44:39+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Incident-Response-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/security-operations-and-monitoring/</loc>
    <lastmod>2025-12-31T14:44:49+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Security-Operations-and-Monitoring-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/software-and-systems-security/</loc>
    <lastmod>2025-12-31T14:48:47+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Software-and-Systems-Security-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/threat-and-vulnerability-management/</loc>
    <lastmod>2025-12-31T14:48:57+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Threat-and-Vulnerability-Management-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/monitoring-and-managing-linux-processes/</loc>
    <lastmod>2025-12-31T14:49:09+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/process-management-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/kali-linux-command-line-fundamentals/</loc>
    <lastmod>2025-12-31T14:49:20+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/kali-linx-cmd-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/biometrics-and-cybersecurity/</loc>
    <lastmod>2025-12-31T14:50:48+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Biometrics-2-1-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/biometrics-and-border-security/</loc>
    <lastmod>2025-12-31T14:52:22+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Eurostar-St-Pancras-ABC-eGates-1024x632-1-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/biometrics-as-a-service/</loc>
    <lastmod>2025-12-31T14:53:06+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/BaaS-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/speech-and-voice-recognition/</loc>
    <lastmod>2025-12-31T14:53:19+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Voice-Recognition-770x540-1-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/signature-biometrics/</loc>
    <lastmod>2025-12-31T14:53:44+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/10424-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/retina-scanning/</loc>
    <lastmod>2025-12-31T14:53:53+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/illinois-bipa-outdated-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/keystroke-dynamics/</loc>
    <lastmod>2025-12-31T14:54:02+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/keystroke_dynamics1-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/gait-recognition/</loc>
    <lastmod>2025-12-31T14:54:11+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/hqdefault-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/dna-recognition/</loc>
    <lastmod>2025-12-31T14:54:19+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/t01holographicdnaid05-01_4x-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/hand-geometry-recording/</loc>
    <lastmod>2025-12-31T14:54:26+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/featured_hu1817109837682e76b5db9d356e616964_765351_720x0_resize_lanczos_2-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/vein-recognition-vpr/</loc>
    <lastmod>2025-12-31T14:54:37+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/1_zqf68K5_-0xItVPVOmn4zw-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/iris-detection/</loc>
    <lastmod>2025-12-31T14:56:12+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/biometrics-eye-1-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/face-recognition/</loc>
    <lastmod>2025-12-31T14:56:26+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/biometrics-1-1-1-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/fingerprint-recognition/</loc>
    <lastmod>2025-12-31T14:56:43+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/biometric-authentication-og-1-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-a-core-1-220-1101-and-core-2-220-1102-on-demand/</loc>
    <lastmod>2025-12-31T14:13:49+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/A-1-1-2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-security-on-demand/</loc>
    <lastmod>2025-12-31T14:13:10+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/security_400-250-3-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-advanced-security-practitioner-casp-004-on-demand/</loc>
    <lastmod>2025-12-31T14:13:24+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/casp-2-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-a-core-2-220-1102/</loc>
    <lastmod>2025-12-31T14:13:35+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/A-1-1-2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-a/</loc>
    <lastmod>2025-12-31T14:14:03+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/A-1-1-2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cyber-security-essentials-certcop/</loc>
    <lastmod>2025-12-31T14:17:01+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cyber-security-essintials-2-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-project-pk0-005-on-demand/</loc>
    <lastmod>2025-12-31T14:21:28+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/project-3-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-information-security-manager-cism-on-demand/</loc>
    <lastmod>2025-12-31T14:26:54+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/CISM-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/systems-security-certified-practitioner-sscp-on-demand/</loc>
    <lastmod>2025-12-31T14:27:18+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/SSCP-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/postgresqlcert-dba-on-demand/</loc>
    <lastmod>2025-12-31T14:27:30+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/postgres-400x300-1-1.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-network-n10-009/</loc>
    <lastmod>2025-12-31T14:14:18+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/network-4-2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-virtual-live-trainer/</loc>
    <lastmod>2025-12-31T14:28:21+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/CVLT-logo-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-linux-xk0-005/</loc>
    <lastmod>2025-12-31T14:28:51+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/linux-3-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-pentest-pt0-002/</loc>
    <lastmod>2025-12-31T14:14:26+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/pentest-1-1-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cloud-security/</loc>
    <lastmod>2025-12-31T14:49:49+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-Security-FedRAMP400-300-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-biometric-security-engineer/</loc>
    <lastmod>2025-12-31T14:50:10+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/cbse-logo-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/cloud-security-fedramp-certified-specialist/</loc>
    <lastmod>2025-12-31T14:57:43+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/Cloud-Security-FedRAMP400-300-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-cybercop-blue-team/</loc>
    <lastmod>2025-12-31T14:50:21+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/blue-team-logo-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-cloud-essentials/</loc>
    <lastmod>2025-12-31T14:58:07+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/cloudessen-1-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-cloud/</loc>
    <lastmod>2025-12-31T14:58:14+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/cloud-1-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/comptia-cysa/</loc>
    <lastmod>2025-12-31T14:58:24+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/cysa-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/red-team-certcop/</loc>
    <lastmod>2025-12-31T14:50:28+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/red-team-logo-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-kali-linux-pentester-cklpt-certcop-2/</loc>
    <lastmod>2025-12-31T14:57:56+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/kali-linux400-300-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-information-systems-security-professional/</loc>
    <lastmod>2025-12-31T14:57:19+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/CISSP-2-1.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://araunahconsulting.com/courses/certified-biometric-security-professional/</loc>
    <lastmod>2025-12-31T14:57:33+01:00</lastmod>
    <image:image>
      <image:loc>https://araunahconsulting.com/wp-content/uploads/2025/02/cbsp-logo-1.png</image:loc>
    </image:image>
  </url>
</urlset>
