<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cybersecurityjunior.com/posts/networking-basics/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/imposter-syndrome/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/wireshark-analysis/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/security-plus-exam/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/my-transition-from-it-to-cybersecurity/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/setting-up-my-first-home-lab/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/building-an-automated-aws-compliance-tool/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/how-i-passed-the-devsecops-interview/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/aws-iam-fundamentals-for-beginners/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/aws-s3-security-basics/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/python-boto3-aws-automation/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/docker-containerization-basics/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/kubernetes-orchestration-basics/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/aws-ec2-security-groups/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/aws-vpc-networking-fundamentals/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/elasticsearch-siem-basics/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/cicd-security-fundamentals/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/infrastructure-as-code-basics/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/posts/compliance-frameworks-explained/</loc>
<lastmod>2026-01-18T04:37:46-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/2026-01-17-aws-security-compliance-automation/</loc>
<lastmod>2026-01-17T14:00:00-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/2026-01-17-aws-vpc-security-hardening/</loc>
<lastmod>2026-01-17T14:15:00-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/2026-01-17-cloud-threat-detection-engine/</loc>
<lastmod>2026-01-17T14:30:00-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/2026-01-17-devsecops-pipeline-security/</loc>
<lastmod>2026-01-17T14:45:00-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/2026-01-17-aws-iam-governance-platform/</loc>
<lastmod>2026-01-17T15:00:00-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/2026-01-17-aws-iam-engineer-analysis-toolkit/</loc>
<lastmod>2026-01-17T15:15:00-05:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/projects/</loc>
<lastmod>2026-04-29T15:43:49-04:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/</loc>
<lastmod>2026-04-29T15:43:49-04:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/about/</loc>
<lastmod>2026-04-29T15:43:49-04:00</lastmod>
</url>
<url>
<loc>https://cybersecurityjunior.com/my_pages/about-me/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/my_pages/my-project/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/my_pages/projects/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/networking/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/basics/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/security/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/osi-model/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/tcp-ip/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/dns/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/ports/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/my-journey/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/imposter-syndrome/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/career/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/learning/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/cybersecurity/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/wireshark/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/packet-analysis/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/incident-response/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/tools/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/security/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/comptia/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/certification/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/study-guide/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/exam/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/transition/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/it/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/homelab/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/virtualization/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/proxmox/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/aws/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/compliance/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/automation/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/devsecops/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/python/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/boto3/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/elasticsearch/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/docker/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/kubernetes/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/interview/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/tips/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/job-search/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/iam/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/cloud-security/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/identity-management/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/access-control/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/beginners/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/s3/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/cloud-storage/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/encryption/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/scripting/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/containers/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/containerization/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/devops/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/k8s/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/orchestration/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/ec2/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/security-groups/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/firewall/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/vpc/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/subnets/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/routing/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/siem/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/elk-stack/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/security-monitoring/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/log-analysis/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/cicd/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/github-actions/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/gitlab-ci/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/jenkins/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/terraform/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/pulumi/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/infrastructure-as-code/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/iac/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/cloud/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/soc2/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/iso27001/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/nist/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/security-frameworks/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/tags/auditing/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/networking/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/my-journey/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/discovery/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/certifications/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/career-transition/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/home-lab/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/devsecops/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/aws/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/automation/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/compliance/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/career-tips/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/cloud-security/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/fundamentals/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/storage/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/python/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/docker/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/devops/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/security/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/kubernetes/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/siem/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/security-monitoring/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/elasticsearch/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/ci-cd/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/infrastructure/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/categories/business/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/page2/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/page3/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/page4/</loc>
</url>
<url>
<loc>https://cybersecurityjunior.com/assets/resume/MABELE-LIANGO-Hearst-SecEngineer.pdf</loc>
<lastmod>2026-04-29T15:40:11-04:00</lastmod>
</url>
</urlset>
