<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://4str.net/0/Thoughts/000+-+Thoughts+Contents</loc></url><url><loc>https://4str.net/0/Research/000+-+Research+Contents</loc></url><url><loc>https://4str.net/0/Home</loc></url><url><loc>https://4str.net/0/Guides/000+-+Guides+Contents</loc></url><url><loc>https://4str.net/0/Who+Is</loc></url><url><loc>https://4str.net/0/Thoughts/001+-+Combating+Learning+Plateaus</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/000+-+Security+and+Risk+Management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/008+-+Security+ethics</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/011+-+Risk+response+and+treatment</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/006+-+Cybercrime%2C+IP+and+software+law</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/012+-+Business+continuity+concepts</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/016+-+Security+culture</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/002+-+Security+governance+basics</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/009+-+Risk+management+overview</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/003+-+Policies%2C+standards%2C+procedures%2C+guidelines</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/015+-+Security+awareness+and+training</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/005+-+Legal+systems+and+types+of+law</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/014+-+Third-party+and+supplier+risk</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/004+-+Due+care+vs+due+diligence</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/007+-+Regulations%2C+standards+and+compliance</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/001+-+CIA+triad+and+beyond</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/010+-+Qualitative+and+quantitative+risk+analysis</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+1+%E2%80%93+Security+and+Risk+Management/013+-+Security+documentation+and+classification</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/000+-+Asset+Security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/004+-+Privacy+concepts</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/002+-+Asset+inventory+and+classification</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/005+-+Data+retention+and+destruction</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/003+-+Data+handling+requirements</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/001+-+Information+and+asset+lifecycle</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/007+-+Asset+security+roles+and+responsibilities</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+2+%E2%80%93+Asset+Security/006+-+Data+security+in+the+cloud</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/000+-+Security+Architecture+and+Engineering</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/012+-+Hardware+and+firmware+security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/003+-+System+evaluation+and+assurance</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/005+-+Cryptography+fundamentals</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/013+-+Security+for+architectures+(on-prem%2C+cloud%2C+hybrid)</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/009+-+Digital+signatures+and+PKI</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/006+-+Symmetric+cryptography</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/011+-+Physical+security+design</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/004+-+Trusted+computing+concepts</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/014+-+Compromising+and+protecting+architectures</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/002+-+Security+models+(high-level)</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/007+-+Asymmetric+cryptography</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/008+-+Hashing+and+message+integrity</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/001+-+Security+architecture+principles</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+3+%E2%80%93+Security+Architecture+and+Engineering/010+-+Key+management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/000+-+Communication+and+Network+Security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/003+-+Network+devices+and+their+roles</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/001+-+Network+models+and+fundamentals</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/007+-+Secure+protocols</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/005+-+IP+addressing+and+routing+basics</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/008+-+Wireless+security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/006+-+Transport+and+session+security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/010+-+Network+security+monitoring</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/004+-+Secure+network+design</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/002+-+Network+topologies+and+technologies</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+4+%E2%80%93+Communication+and+Network+Security/009+-+Network+attacks</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/000+-+Identity+and+Access+Management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/005+-+Identity+lifecycle+management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/006+-+Privileged+access+management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/008+-+Accountability+and+logging</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/001+-+Core+access+control+concepts</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/002+-+Authentication+factors+and+methods</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/003+-+Access+control+models</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/004+-+Centralised+and+federated+IAM</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+5+%E2%80%93+Identity+and+Access+Management/007+-+Access+control+attacks+and+weaknesses</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/000+-+Security+Assessment+and+Testing</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/001+-+Security+testing+strategy+and+planning</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/005+-+Security+testing+in+SDLC</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/004+-+Security+audits</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/002+-+Vulnerability+assessment</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/007+-+Continuous+monitoring</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/006+-+Operational+security+testing</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+6+%E2%80%93+Security+Assessment+and+Testing/003+-+Penetration+testing</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/000+-+Security+Operations</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/006+-+Containment%2C+eradication+and+recovery</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/011+-+Logging+and+monitoring+operations</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/002+-+Change+and+configuration+management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/001+-+Operational+security+concepts</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/005+-+Detection+and+analysis</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/009+-+Physical+and+environmental+operations</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/003+-+Capacity+and+performance+management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/010+-+Administrative+operations</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/008+-+Business+continuity+and+DR+operations</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/012+-+Malware+and+endpoint+operations</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/004+-+Incident+response+lifecycle</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+7+%E2%80%93+Security+Operations/007+-+Forensics+basics</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/000+-+Software+Development+Security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/007+-+Configuration+and+dependency+management</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/008+-+Database+and+data+layer+security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/009+-+Application+security+controls</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/003+-+Common+software+vulnerabilities</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/001+-+SDLC+models</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/005+-+Security+testing+in+development</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/002+-+Secure+design+principles+for+software</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/006+-+Software+environment+security</loc></url><url><loc>https://4str.net/0/Guides/CISSP/Domain+8+%E2%80%93+Software+Development+Security/004+-+Secure+coding+practices</loc></url><url><loc>https://4str.net/0/Guides/CISSP/000+-+CISSP+Homepage</loc></url></urlset>