<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://issep.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/course-hub</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T02:49:25Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/welcome-to-certified-the-isc-2-issep-audio-course</loc>
    <lastmod>2026-03-29T05:39:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-1-decode-the-issep-exam-blueprint-timing-scoring-item-types-rules</loc>
    <lastmod>2026-03-29T05:39:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-2-build-a-listener-only-study-strategy-that-matches-every-issep-domain</loc>
    <lastmod>2026-03-29T05:40:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-3-master-exam-tactics-without-memorizing-how-to-think-like-issep</loc>
    <lastmod>2026-03-29T05:40:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-4-exam-acronyms-high-yield-audio-reference-for-instant-recognition</loc>
    <lastmod>2026-03-29T05:40:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-5-essential-terms-plain-language-glossary-for-fast-security-engineering-recall</loc>
    <lastmod>2026-03-29T05:40:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-6-apply-trust-concepts-and-hierarchies-to-real-system-security-boundaries</loc>
    <lastmod>2026-03-29T05:41:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-7-connect-systems-engineering-and-security-engineering-processes-without-gaps</loc>
    <lastmod>2026-03-29T05:41:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-8-use-structural-security-design-principles-to-prevent-predictable-failure-modes</loc>
    <lastmod>2026-03-29T05:41:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-9-translate-nist-and-iso-27001-thinking-into-practical-engineering-decisions</loc>
    <lastmod>2026-03-29T05:42:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-10-execute-security-engineering-across-hardware-software-and-data-lifecycles</loc>
    <lastmod>2026-03-29T05:43:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-11-choose-open-proprietary-and-modular-design-concepts-for-secure-outcomes</loc>
    <lastmod>2026-03-29T05:43:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-12-work-with-organizational-security-authorities-to-drive-accountable-decisions</loc>
    <lastmod>2026-03-29T05:43:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-13-engineer-governance-and-compliance-into-systems-without-killing-delivery</loc>
    <lastmod>2026-03-29T05:43:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-14-integrate-security-tasks-and-activities-into-any-development-methodology</loc>
    <lastmod>2026-03-29T05:44:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-15-verify-security-requirements-continuously-across-sdlc-and-modern-delivery</loc>
    <lastmod>2026-03-29T05:44:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-16-select-assurance-methods-across-software-hardware-virtual-and-cloud-systems</loc>
    <lastmod>2026-03-29T05:45:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-17-use-sdlc-and-model-based-systems-engineering-to-keep-security-traceable</loc>
    <lastmod>2026-03-29T05:45:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-18-participate-in-project-management-processes-without-losing-security-intent</loc>
    <lastmod>2026-03-29T05:46:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-19-operationalize-configuration-management-and-quality-assurance-for-secure-systems</loc>
    <lastmod>2026-03-29T05:46:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-20-run-information-management-and-measurement-processes-that-reveal-security-reality</loc>
    <lastmod>2026-03-29T05:46:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-21-evaluate-security-process-automation-solutions-without-automating-bad-decisions</loc>
    <lastmod>2026-03-29T05:46:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-22-define-security-requirements-for-acquisitions-that-vendors-can-actually-meet</loc>
    <lastmod>2026-03-29T05:47:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-23-apply-supply-chain-risk-management-and-review-contract-deliverables-like-an-engineer</loc>
    <lastmod>2026-03-29T05:47:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-24-estimate-cost-personnel-and-reliability-impacts-without-fantasy-numbers</loc>
    <lastmod>2026-03-29T05:47:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-25-use-monte-carlo-mtbf-mttf-mttr-and-mtd-to-explain-risk-clearly</loc>
    <lastmod>2026-03-29T05:48:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-26-align-security-risk-management-with-enterprise-risk-management-without-translation-loss</loc>
    <lastmod>2026-03-29T05:48:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-27-integrate-risk-management-throughout-the-lifecycle-from-concept-to-disposal</loc>
    <lastmod>2026-03-29T05:48:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-28-establish-risk-context-for-systems-scope-assumptions-and-decision-criteria</loc>
    <lastmod>2026-03-29T05:48:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-29-identify-threats-events-vulnerabilities-and-impacts-with-engineering-precision</loc>
    <lastmod>2026-03-29T05:49:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-30-perform-inherent-risk-analysis-risk-evaluation-and-document-risk-posture</loc>
    <lastmod>2026-03-29T05:49:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-31-monitor-residual-changed-and-new-risks-as-system-reality-shifts</loc>
    <lastmod>2026-03-29T05:49:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-32-turn-findings-and-decisions-into-risk-documentation-leaders-will-defend</loc>
    <lastmod>2026-03-29T05:50:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-33-establish-operational-risk-context-for-production-systems-and-mission-outcomes</loc>
    <lastmod>2026-03-29T05:50:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-34-identify-operational-threats-events-vulnerabilities-and-impacts-that-matter</loc>
    <lastmod>2026-03-29T05:50:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-35-evaluate-operational-risk-track-posture-changes-and-document-decisions</loc>
    <lastmod>2026-03-29T06:09:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-36-capture-stakeholder-requirements-without-losing-security-meaning-in-translation</loc>
    <lastmod>2026-03-29T06:10:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-37-define-roles-responsibilities-constraints-assumptions-and-a-validation-plan</loc>
    <lastmod>2026-03-29T06:10:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-38-engineer-resiliency-with-redundancy-and-diversity-without-creating-new-weaknesses</loc>
    <lastmod>2026-03-29T06:10:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-39-apply-defense-in-depth-zero-trust-and-secure-by-default-in-real-designs</loc>
    <lastmod>2026-03-29T06:10:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-40-choose-fail-open-fail-secure-and-fail-closed-using-mission-logic</loc>
    <lastmod>2026-03-29T06:11:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-41-eliminate-single-points-of-failure-before-they-become-incident-headlines</loc>
    <lastmod>2026-03-29T06:11:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-42-apply-least-privilege-and-economy-of-mechanism-to-reduce-attack-surface</loc>
    <lastmod>2026-03-29T06:11:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-43-separate-interfaces-functions-services-and-roles-to-contain-blast-radius</loc>
    <lastmod>2026-03-29T06:12:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-44-automate-threat-response-and-secdevops-without-handing-attackers-the-keys</loc>
    <lastmod>2026-03-29T06:12:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-45-build-software-assurance-into-engineering-decisions-not-just-testing-checklists</loc>
    <lastmod>2026-03-29T06:12:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-46-design-data-security-into-storage-processing-and-movement-across-the-system</loc>
    <lastmod>2026-03-29T06:13:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-47-combine-layering-separation-and-resiliency-into-one-coherent-security-story</loc>
    <lastmod>2026-03-29T06:13:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-48-develop-system-security-context-that-explains-the-why-behind-requirements</loc>
    <lastmod>2026-03-29T06:13:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-49-identify-functions-and-build-a-security-concept-of-operations-that-holds-up</loc>
    <lastmod>2026-03-29T06:13:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-50-document-a-security-requirements-baseline-that-engineers-can-trace-and-validate</loc>
    <lastmod>2026-03-29T06:14:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-51-analyze-system-security-requirements-to-catch-conflicts-gaps-and-ambiguity</loc>
    <lastmod>2026-03-29T06:14:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-52-create-functional-analysis-and-allocation-that-makes-security-implementable</loc>
    <lastmod>2026-03-29T06:18:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-53-develop-security-design-components-that-map-cleanly-to-requirements</loc>
    <lastmod>2026-03-29T06:18:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issep.baremetalcyber.com/episodes/episode-54-maintain-traceability-perform-trade-off-studies-and-validate-the-final-design</loc>
    <lastmod>2026-03-29T06:19:10Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
