<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.cyberteachers.org</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/tarifs</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/pour/ecoles-ingenieurs</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.92</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/pour/bootcamps</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.92</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/pour/universites</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.92</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/pour/formation-continue</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.92</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/outils-pedagogiques</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/checkliste-brief-cours</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/pentest</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/blue-team</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/analyse-soc</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/forensic</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/reponse-incident</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-web</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-reseau</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/cryptographie</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/grc</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/rgpd-conformite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-cloud</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/devsecops</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/sensibilisation</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-active-directory</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/reverse-engineering</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/osint</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-mobile</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-iot</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/threat-intelligence</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/gestion-crise</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/secure-coding</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/architecture-securisee</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/red-team</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/bug-bounty</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/malware-analysis</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-ia</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/purple-team</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/securite-kubernetes</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/gestion-vulnerabilites</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/cours/investigation-numerique</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.85</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/phishing</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/spear-phishing</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ransomware</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/malware</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/trojan</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ver-informatique</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ddos</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/injection-sql</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/xss</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/csrf</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/zero-day</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/apt</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ingenierie-sociale</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/supply-chain-attack</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/credential-stuffing</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/man-in-the-middle</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/firewall</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ids-ips</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/waf</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/edr</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/antivirus</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/sandboxing</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/honeypot</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/segmentation-reseau</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/sauvegarde</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/patch-management</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/hardening</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/defense-en-profondeur</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/dmz</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/chiffrement</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/chiffrement-symetrique</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/chiffrement-asymetrique</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/hash-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/pki</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/certificat-tls</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/signature-numerique-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/vpn-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/dns-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/vlan</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/https-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/proxy-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/wifi-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/cloud-securite-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/rgpd-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/iso-27001-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/nis2-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/analyse-de-risques-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/pssi-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/audit-securite-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/plan-continuite-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/classification-donnees-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/owasp-top-10</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/mitre-attack</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/kill-chain</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ebios-rm-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/nist-framework</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/cve</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/cvss-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/threat-modeling</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/soc-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/siem-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/soar-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/log-management-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/reponse-a-incident</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/forensic-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/gestion-vulnerabilites-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/detection-intrusion-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/pentest-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/red-team-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/blue-team-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/purple-team-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/bug-bounty-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ctf-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/osint-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/escalade-privileges</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/iam-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/mfa</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/zero-trust-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/rbac-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/authentification</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/active-directory-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/gestion-mots-de-passe</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/oauth-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/devsecops-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/sast-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/dast-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/secure-coding-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/dependency-check-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/api-security-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/container-security-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/sensibilisation-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/byod-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/shadow-it</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/signalement-incident</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ia-cybersecurite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/iot-securite-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/ot-securite-glossaire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/deepfake</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/glossaire/quantum-safe</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/analyste-soc</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/pentesteur</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/rssi</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/consultant-grc</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/ingenieur-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/analyste-threat-intelligence</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/incident-responder</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/architecte-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/developpeur-securise</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/red-teamer</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/analyste-vulnerabilites</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/cryptologue</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/devops-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/dpo</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/formateur-cybersecurite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/threat-hunter</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/auditeur-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/chef-projet-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/analyste-malware</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/bug-bounty-hunter</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/responsable-continuite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/expert-securite-cloud</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/osint-analyste</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/metiers/securite-iot-specialiste</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/comptia-security-plus</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/cissp</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/oscp</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/ceh</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/comptia-cysa-plus</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/iso-27001-lead-auditor</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/iso-27001-lead-implementer</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/ccsp</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/cism</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/btl1</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/sans-gcih</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/sans-gcfe</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/ewpt</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/cisa</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/aws-security-specialty</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/oswe</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/grem</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/ebios-rm-certif</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/splunk-core-certified-user</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/certifications/cipp-e</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/bootcamp-vs-universite-vs-ecole</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/presentiel-vs-distanciel-vs-hybride</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/certifications-comparees</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/formateur-interne-vs-externe</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/ctf-vs-lab-vs-projet</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/outils-siem-compares</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/cyber-teachers-vs-recruter-vacataire</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/comparer/freelance-vs-agence-formation-cyber</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/pentest</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/soc-blue-team</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/forensic</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/securite-web</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/securite-reseau</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/cryptographie</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/grc-iso27001</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/devsecops</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/securite-cloud</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/sensibilisation</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/securite-active-directory</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/gestion-crise</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/red-team</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/threat-intelligence</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/securite-iot</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/rgpd-conformite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/securite-mobile</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/osint</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/malware-analysis</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/syllabus/purple-team</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/tp-pentest</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/rapport-audit</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/configuration-firewall</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/analyse-logs</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/reponse-incident</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/code-review-securite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/analyse-risques</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/investigation-forensique</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/securisation-ad</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ressources/evaluation/configuration-siem</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/paris</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/lyon</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/marseille</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/toulouse</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/nice</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/nantes</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/strasbourg</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/montpellier</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/bordeaux</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/lille</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/rennes</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/reims</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/le-havre</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/grenoble</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/dijon</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/angers</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/saint-etienne</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/toulon</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/clermont-ferrand</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/nancy</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/tours</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/orleans</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/rouen</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/caen</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/avignon</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.75</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/bruxelles</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/geneve</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/lausanne</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/montreal</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/quebec</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/dakar</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/abidjan</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/tunis</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/casablanca</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/alger</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/liege</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/ville/luxembourg</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.82</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/classement-meilleurs-professeurs-cybersecurite</loc>
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/enseigner-cybersecurite-ecole-ingenieurs</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/enseigner-pentest-etudiants-retour-experience</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/erreurs-formateurs-cybersecurite</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/pedagogie-active-cybersecurite</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/recruter-formateur-cybersecurite-5-criteres</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/tendances-enseignement-cybersecurite-2025</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/blog/trouver-enseignant-cybersecurite-24h</loc>
<lastmod>2024-12-19T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/mentions-legales</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.1</priority>
</url>
<url>
<loc>https://www.cyberteachers.org/politique-de-confidentialite</loc>
<lastmod>2026-04-14T22:31:59.451Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.1</priority>
</url>
</urlset>
