<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gpcs.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T22:23:31Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-1-decode-the-gpcs-exam-format-timing-and-scoring-with-calm-precision</loc>
    <lastmod>2026-02-14T06:06:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-2-master-giac-testing-rules-open-book-boundaries-and-proctoring-realities</loc>
    <lastmod>2026-02-14T06:06:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-3-map-today-s-public-cloud-landscape-risks-without-vendor-blind-spots</loc>
    <lastmod>2026-02-14T06:07:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-4-compare-aws-azure-and-gcp-security-strengths-and-weak-defaults</loc>
    <lastmod>2026-02-14T06:07:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-5-spot-shared-responsibility-gaps-that-quietly-create-real-cloud-exposure</loc>
    <lastmod>2026-02-14T06:07:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-6-understand-instance-metadata-apis-and-why-attackers-love-them</loc>
    <lastmod>2026-02-14T06:07:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-7-assess-metadata-service-hardening-to-block-credential-harvesting-paths</loc>
    <lastmod>2026-02-14T06:07:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-8-detect-and-prevent-metadata-driven-privilege-escalation-across-cloud-workloads</loc>
    <lastmod>2026-02-14T06:07:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-9-build-metadata-safe-compute-patterns-that-survive-real-attacker-pressure</loc>
    <lastmod>2026-02-14T06:07:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-10-identify-credential-exposure-paths-from-workloads-images-and-build-pipelines</loc>
    <lastmod>2026-02-14T06:08:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-11-define-cloud-iam-fundamentals-with-least-privilege-as-a-living-system</loc>
    <lastmod>2026-02-14T06:08:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-12-audit-iam-policies-for-overreach-wildcard-abuse-and-accidental-admin</loc>
    <lastmod>2026-02-14T06:08:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-13-design-role-separation-that-stops-privilege-creep-without-breaking-delivery</loc>
    <lastmod>2026-02-14T06:08:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-14-validate-identity-boundaries-across-accounts-subscriptions-and-projects</loc>
    <lastmod>2026-02-14T06:08:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-15-enforce-conditional-access-patterns-that-limit-risk-without-killing-usability</loc>
    <lastmod>2026-02-14T06:08:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-16-reduce-permission-blast-radius-with-scoped-roles-and-resource-segmentation</loc>
    <lastmod>2026-02-14T06:08:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-17-review-and-recall-cloud-landscape-metadata-and-iam-essentials-together</loc>
    <lastmod>2026-02-14T06:09:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-18-secure-long-term-credentials-with-storage-patterns-that-resist-theft</loc>
    <lastmod>2026-02-14T06:09:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-19-reduce-secret-sprawl-by-redesigning-how-humans-and-services-authenticate</loc>
    <lastmod>2026-02-14T06:09:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-20-operationalize-credential-rotation-and-revocation-without-fragile-handwork</loc>
    <lastmod>2026-02-14T06:09:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-21-protect-automation-credentials-with-short-lived-access-patterns-and-guardrails</loc>
    <lastmod>2026-02-14T06:09:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-22-recognize-credential-misuse-signals-hidden-in-everyday-cloud-activity</loc>
    <lastmod>2026-02-14T06:10:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-23-audit-cloud-environments-using-benchmark-tools-and-compliance-lenses</loc>
    <lastmod>2026-02-14T06:10:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-24-turn-benchmark-findings-into-concrete-fixes-that-actually-reduce-risk</loc>
    <lastmod>2026-02-14T06:10:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-25-measure-configuration-drift-and-prove-controls-stay-in-place-over-time</loc>
    <lastmod>2026-02-14T06:10:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-26-build-evidence-ready-cloud-auditing-habits-that-survive-real-scrutiny</loc>
    <lastmod>2026-02-14T06:11:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-27-validate-control-effectiveness-by-testing-what-misconfigurations-still-allow</loc>
    <lastmod>2026-02-14T06:11:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-28-build-end-user-identity-management-that-fits-cloud-realities-not-wishful-thinking</loc>
    <lastmod>2026-02-14T06:11:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-29-evaluate-cloud-single-sign-on-solutions-for-security-and-operational-resilience</loc>
    <lastmod>2026-02-14T06:11:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-30-harden-identity-federation-paths-to-prevent-trust-abuse-and-token-misuse</loc>
    <lastmod>2026-02-14T06:11:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-31-detect-identity-anomalies-by-understanding-normal-authentication-behaviors</loc>
    <lastmod>2026-02-14T06:11:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-32-reduce-token-and-session-risk-with-strong-lifecycle-and-revocation-discipline</loc>
    <lastmod>2026-02-14T06:12:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-33-design-key-management-systems-with-clear-ownership-and-strong-boundaries</loc>
    <lastmod>2026-02-14T06:12:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-34-assess-kms-security-posture-using-threat-driven-questions-that-reveal-gaps</loc>
    <lastmod>2026-02-14T06:12:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-35-prevent-key-misuse-through-permissions-separation-and-careful-key-lifecycle</loc>
    <lastmod>2026-02-14T06:12:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-36-encrypt-sensitive-data-in-cloud-platforms-with-sane-defaults-and-verified-outcomes</loc>
    <lastmod>2026-02-14T06:12:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-37-choose-encryption-approaches-that-survive-incident-response-and-legal-scrutiny</loc>
    <lastmod>2026-02-14T06:12:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-38-protect-encryption-workflows-from-misconfigurations-that-silently-disable-security</loc>
    <lastmod>2026-02-14T06:12:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-39-validate-encryption-coverage-so-enabled-means-provably-protecting-the-data</loc>
    <lastmod>2026-02-14T06:13:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-40-secure-cloud-storage-services-by-design-not-by-hope</loc>
    <lastmod>2026-02-14T06:13:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-41-prevent-accidental-public-exposure-with-durable-storage-access-patterns</loc>
    <lastmod>2026-02-14T06:13:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-42-control-storage-permissions-with-least-privilege-and-tight-data-boundaries</loc>
    <lastmod>2026-02-14T06:14:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-43-reduce-cloud-storage-data-exfiltration-risk-with-detection-minded-controls</loc>
    <lastmod>2026-02-14T06:14:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-44-detect-storage-abuse-through-access-patterns-anomalies-and-logging-discipline</loc>
    <lastmod>2026-02-14T06:14:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-45-respond-to-storage-misconfiguration-signals-before-they-become-headlines</loc>
    <lastmod>2026-02-14T06:15:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-46-securely-access-cloud-services-using-private-endpoints-and-scoped-connectivity</loc>
    <lastmod>2026-02-14T06:15:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-47-decide-when-private-service-endpoints-beat-public-exposure-in-real-architectures</loc>
    <lastmod>2026-02-14T06:15:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-48-harden-remote-administrative-access-without-leaving-durable-attack-surfaces</loc>
    <lastmod>2026-02-14T06:15:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-49-reduce-admin-compromise-risk-using-strong-authentication-and-access-constraints</loc>
    <lastmod>2026-02-14T06:15:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-50-restrict-administrative-paths-to-trusted-networks-while-keeping-operations-moving</loc>
    <lastmod>2026-02-14T06:16:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-51-secure-cloud-application-service-platforms-with-hardened-baseline-configurations</loc>
    <lastmod>2026-02-14T06:16:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-52-assess-managed-application-services-for-misconfigurations-attackers-exploit-first</loc>
    <lastmod>2026-02-14T06:16:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-53-reduce-control-plane-risk-by-locking-down-service-settings-and-permissions</loc>
    <lastmod>2026-02-14T06:16:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-54-build-secure-defaults-for-cloud-application-services-that-teams-will-keep</loc>
    <lastmod>2026-02-14T06:16:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-55-verify-hardened-configurations-remain-stable-through-updates-and-team-changes</loc>
    <lastmod>2026-02-14T06:17:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-56-secure-serverless-architectures-by-understanding-their-real-attack-surfaces</loc>
    <lastmod>2026-02-14T06:17:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-57-assess-serverless-environments-for-misconfigurations-that-enable-takeover</loc>
    <lastmod>2026-02-14T06:17:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-58-harden-serverless-functions-to-block-persistence-reinfection-and-silent-reuse</loc>
    <lastmod>2026-02-14T06:17:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-59-prevent-serverless-privilege-overreach-with-tight-identity-and-resource-scopes</loc>
    <lastmod>2026-02-14T06:17:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/episode-60-secure-serverless-event-triggers-so-trusted-inputs-cannot-be-quietly-replaced</loc>
    <lastmod>2026-02-14T06:18:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gpcs.baremetalcyber.com/episodes/welcome-to-certified-the-giac-gpcs-audio-course</loc>
    <lastmod>2026-02-10T22:18:15Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
