<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://aaronsawit.com/about/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/img-20240911-wa0002-1.jpg</image:loc><image:title>IMG-20240911-WA0002</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/img-20240911-wa0002.jpg</image:loc><image:title>IMG-20240911-WA0002</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/hacker-from-the-back-doing-alot-of-work-no-face-1.png</image:loc><image:title>hacker-from-the-back-doing-alot-of-work-no-face</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/hacker-from-the-back-doing-alot-of-work-no-face.png</image:loc><image:title>hacker-from-the-back-doing-alot-of-work-no-face</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/hacker-from-the-back-doing-alot-of-work.png</image:loc><image:title>hacker-from-the-back-doing-alot-of-work</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/hacker.png</image:loc><image:title>hacker</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-29T11:42:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://aaronsawit.com/2025/05/28/state-hackers-exploiting-cisco-zero-days-in-live-networks-arcanedoor-breakdown-for-blue-teams/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-29T11:41:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com/2024/12/20/understanding-nist-and-iso-27001-why-cybersecurity-frameworks-matter/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2025/02/cybersecurity-framwork.png</image:loc><image:title>cybersecurity-framwork</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2025/02/create-a-highly-detailed-and-visually-engaging-image-that-represents-1.png</image:loc><image:title>create-a-highly-detailed-and-visually-engaging-image-that-represents</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2025/02/create-a-highly-detailed-and-visually-engaging-image-that-represents.png</image:loc><image:title>create-a-highly-detailed-and-visually-engaging-image-that-represents</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2025/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-02-20T16:25:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com/2024/11/27/my-journey-through-sans-sec504-how-i-prepared-what-i-learned-and-tips-for-the-exam/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/11/giac-certified-incident-handler-gcih.png</image:loc><image:title>giac-certified-incident-handler-gcih</image:title></image:image><lastmod>2024-11-27T08:49:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com/2024/09/28/window-event-logs/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/windows-event-logs-.png</image:loc><image:title>windows event logs</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/windows-computer.png</image:loc><image:title>windows-computer</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/windows-event-logs-1.png</image:loc><image:title>windows-event-logs</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/windows-event-logs.png</image:loc><image:title>windows-event-logs</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-28T15:47:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com/2024/09/08/incident-handling-hack-the-box-soc-pathway/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/incident-handling-cyber-security.png</image:loc><image:title>incident-handling-cyber-security</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/incident-handling-hack-the-box.png</image:loc><image:title>Hacker</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/screenshot-2024-09-03-at-10.46.28e280afpm.png</image:loc><image:title>Screenshot 2024-09-03 at 10.46.28 PM</image:title></image:image><lastmod>2024-09-13T15:08:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com/2024/09/08/security-monitoring-and-siem-hack-the-box-walk-through/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/security-monitoring.png</image:loc><image:title>security-monitoring</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-13T14:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com/2024/09/12/case-study-how-wannacry-changed-the-industry/</loc><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/wanna-cry-malware-1.png</image:loc><image:title>wanna-cry-malware</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/wanna-cry-malware.png</image:loc><image:title>wanna-cry-malware</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/wannacry-malware-2.png</image:loc><image:title>wannacry-malware</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/wannacry-malware-1.png</image:loc><image:title>wannacry-malware</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/wannacry-malware.png</image:loc><image:title>wannacry-malware</image:title></image:image><image:image><image:loc>https://aaronsawit.com/wp-content/uploads/2024/09/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-11T17:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://aaronsawit.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-05-29T11:42:49+00:00</lastmod></url></urlset>
