<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gccc.baremetalcyber.com/</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/course-hub</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-09T01:55:30Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-1-decode-the-gccc-blueprint-domains-scoring-pacing-and-what-71-demands</loc>
    <lastmod>2026-02-14T14:58:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-2-build-an-audio-first-study-plan-recall-cycles-review-rhythm-and-exam-day-flow</loc>
    <lastmod>2026-02-14T14:58:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-3-understand-cis-controls-v8-history-purpose-and-how-the-model-is-organized</loc>
    <lastmod>2026-02-14T14:58:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-4-map-cis-controls-to-major-security-standards-and-governance-expectations</loc>
    <lastmod>2026-02-14T14:58:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-5-operationalize-cis-controls-governance-owners-metrics-reporting-and-accountability</loc>
    <lastmod>2026-02-14T14:58:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-6-define-enterprise-asset-scope-what-counts-why-it-matters-who-owns-accuracy</loc>
    <lastmod>2026-02-14T14:58:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-7-discover-enterprise-assets-continuously-using-multiple-sources-and-reconciliation-discipline</loc>
    <lastmod>2026-02-14T14:58:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-8-validate-enterprise-asset-inventory-quality-with-drift-checks-and-audit-ready-evidence</loc>
    <lastmod>2026-02-14T14:59:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-9-establish-software-asset-authority-approved-lists-licensing-realities-and-control-points</loc>
    <lastmod>2026-02-14T14:59:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-10-detect-unauthorized-software-quickly-using-discovery-signals-baselines-and-change-patterns</loc>
    <lastmod>2026-02-14T14:59:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-11-prevent-unapproved-execution-with-allowlisting-logic-and-tightly-governed-exceptions</loc>
    <lastmod>2026-02-14T14:59:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-12-design-secure-configuration-baselines-that-are-measurable-repeatable-and-realistic</loc>
    <lastmod>2026-02-14T14:59:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-13-control-configuration-drift-with-monitoring-remediation-workflows-and-change-discipline</loc>
    <lastmod>2026-02-14T14:59:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-14-prove-configuration-compliance-with-sampling-evidence-and-exception-governance</loc>
    <lastmod>2026-02-14T15:00:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-15-clarify-account-types-and-lifecycles-user-admin-service-shared-and-temporary</loc>
    <lastmod>2026-02-14T15:00:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-16-provision-accounts-safely-with-approvals-role-fit-and-minimum-privilege-intent</loc>
    <lastmod>2026-02-14T15:00:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-17-deprovision-accounts-cleanly-to-eliminate-orphaned-access-and-lingering-entitlements</loc>
    <lastmod>2026-02-14T15:00:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-18-strengthen-authentication-foundations-factors-session-controls-and-identity-assurance</loc>
    <lastmod>2026-02-14T15:01:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-19-build-authorization-models-that-match-real-work-without-privilege-creep</loc>
    <lastmod>2026-02-14T15:01:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-20-validate-access-control-effectiveness-with-reviews-testing-and-corrective-action</loc>
    <lastmod>2026-02-14T15:01:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-21-build-continuous-vulnerability-management-coverage-scan-cadence-and-owner-assignment</loc>
    <lastmod>2026-02-14T15:02:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-22-prioritize-vulnerabilities-with-risk-context-exploitability-and-exposure-driven-triage</loc>
    <lastmod>2026-02-14T15:02:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-23-close-vulnerabilities-with-verification-evidence-rollback-planning-and-durable-tracking</loc>
    <lastmod>2026-02-14T15:02:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-24-decide-what-to-log-and-why-events-that-power-detection-and-investigations</loc>
    <lastmod>2026-02-14T15:02:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-25-centralize-and-normalize-logs-for-correlation-retention-integrity-and-fast-search</loc>
    <lastmod>2026-02-14T15:02:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-26-turn-logs-into-outcomes-alerting-strategy-review-routines-and-noise-reduction</loc>
    <lastmod>2026-02-14T15:02:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-27-prevent-malware-execution-using-layered-controls-across-endpoints-and-servers</loc>
    <lastmod>2026-02-14T15:02:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-28-contain-malware-spread-with-segmentation-privilege-limits-and-rapid-isolation-routines</loc>
    <lastmod>2026-02-14T15:02:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-29-validate-malware-defenses-with-testing-tuning-and-incident-driven-improvement-loops</loc>
    <lastmod>2026-02-14T15:03:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-30-inventory-network-infrastructure-devices-services-dependencies-and-ownership-clarity</loc>
    <lastmod>2026-02-14T15:03:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-31-harden-network-device-management-planes-to-reduce-takeover-and-tampering-risk</loc>
    <lastmod>2026-02-14T15:03:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-32-control-network-changes-safely-with-baselines-approvals-and-rollback-discipline</loc>
    <lastmod>2026-02-14T15:03:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-33-design-network-visibility-that-matters-telemetry-selection-and-baseline-behavior-modeling</loc>
    <lastmod>2026-02-14T15:03:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-34-detect-threats-faster-with-triage-workflows-escalation-rules-and-response-coordination</loc>
    <lastmod>2026-02-14T15:03:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-35-improve-monitoring-outcomes-with-tuning-validation-and-gap-driven-coverage-fixes</loc>
    <lastmod>2026-02-14T15:03:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-36-reduce-phishing-success-with-email-controls-that-block-warn-and-verify-safely</loc>
    <lastmod>2026-02-14T15:04:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-37-harden-web-browsing-with-technical-safeguards-and-safer-execution-pathways</loc>
    <lastmod>2026-02-14T15:04:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-38-confirm-email-and-browser-protections-work-with-testing-and-measurable-outcomes</loc>
    <lastmod>2026-02-14T15:04:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-39-classify-data-in-practice-sensitivity-tiers-handling-rules-and-real-world-exceptions</loc>
    <lastmod>2026-02-14T15:04:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-40-protect-data-with-access-boundaries-encryption-decisions-and-controlled-sharing-patterns</loc>
    <lastmod>2026-02-14T15:04:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-41-retain-and-dispose-of-data-safely-with-automation-approvals-and-audit-evidence</loc>
    <lastmod>2026-02-14T15:05:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-42-define-recovery-objectives-that-fit-business-reality-rpo-rto-and-scope-decisions</loc>
    <lastmod>2026-02-14T15:05:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-43-protect-backups-as-high-value-targets-access-controls-encryption-and-isolation-strategy</loc>
    <lastmod>2026-02-14T15:05:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-44-prove-recoverability-with-restore-tests-integrity-checks-and-documented-results</loc>
    <lastmod>2026-02-14T15:05:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-45-secure-the-software-lifecycle-end-to-end-design-build-deploy-and-operate-safely</loc>
    <lastmod>2026-02-14T15:05:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-46-reduce-application-risk-by-managing-dependencies-and-patching-weak-components-quickly</loc>
    <lastmod>2026-02-14T15:06:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-47-detect-and-remediate-weaknesses-with-testing-evidence-prioritization-and-closure-proof</loc>
    <lastmod>2026-02-14T15:06:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-48-evaluate-service-providers-with-due-diligence-that-matches-risk-and-criticality</loc>
    <lastmod>2026-02-14T15:06:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-49-enforce-provider-accountability-through-contracts-controls-and-ongoing-assurance-reviews</loc>
    <lastmod>2026-02-14T15:06:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-50-monitor-third-party-risk-continuously-with-signals-assessments-and-escalation-triggers</loc>
    <lastmod>2026-02-14T15:06:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-51-build-awareness-programs-that-change-behavior-not-just-complete-training-requirements</loc>
    <lastmod>2026-02-14T15:06:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-52-measure-training-effectiveness-with-metrics-tied-to-real-risk-reduction-outcomes</loc>
    <lastmod>2026-02-14T15:07:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-53-reinforce-skills-over-time-with-role-based-focus-coaching-and-timely-feedback</loc>
    <lastmod>2026-02-14T15:07:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-54-build-incident-response-readiness-with-roles-playbooks-and-communications-discipline</loc>
    <lastmod>2026-02-14T15:07:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-55-execute-incident-response-under-pressure-detection-containment-and-evidence-handling</loc>
    <lastmod>2026-02-14T15:07:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-56-improve-response-capability-with-lessons-learned-and-continuous-program-refinement</loc>
    <lastmod>2026-02-14T15:07:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-57-plan-penetration-tests-safely-scope-control-rules-of-engagement-and-reporting-clarity</loc>
    <lastmod>2026-02-14T15:07:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-58-translate-pen-test-findings-into-remediation-priorities-and-measurable-control-improvements</loc>
    <lastmod>2026-02-14T15:08:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/episode-59-validate-resilience-after-fixes-with-retesting-and-durable-closure-evidence</loc>
    <lastmod>2026-02-14T15:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gccc.baremetalcyber.com/episodes/welcome-to-the-giac-gccc-audio-course</loc>
    <lastmod>2026-02-09T18:28:25Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
