<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cybersecuritypassion.com/about-2/</loc><lastmod>2025-01-19T12:31:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cybersecuritypassion.com/2024/02/14/osi-and-tcp-ip-model/</loc><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-1.jpg</image:loc><image:title>osi-1</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-2.jpg</image:loc><image:title>osi-2</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-3.jpg</image:loc><image:title>osi-3</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-4.jpg</image:loc><image:title>osi-4</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-5.jpg</image:loc><image:title>osi-5</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-6.jpg</image:loc><image:title>osi-6</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-7-1.jpg</image:loc><image:title>osi-7-1</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-7.jpg</image:loc><image:title>osi-7</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/osi-vs-tcpip.png</image:loc><image:title>osi-vs-tcpip</image:title></image:image><lastmod>2024-02-14T10:25:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritypassion.com/2024/02/13/communication-protocol-tcp-ip/</loc><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/n.png</image:loc><image:title>n</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/i.png</image:loc><image:title>i</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/t.png</image:loc><image:title>t</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/a.png</image:loc><image:title>a</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/02/capture.png</image:loc><image:title>capture</image:title></image:image><lastmod>2024-02-13T11:00:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritypassion.com/2024/01/06/network-overview/</loc><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/dqdb.png</image:loc><image:title>dqdb</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/mesh.png</image:loc><image:title>mesh</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/ring.png</image:loc><image:title>ring</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/star.png</image:loc><image:title>star</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/bus-topology.png</image:loc><image:title>bus-topology</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/nastya-dulhiier-okoogo578eo-unsplash.jpg</image:loc><image:title>nastya-dulhiier-OKOOGO578eo-unsplash</image:title></image:image><lastmod>2024-01-06T12:17:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritypassion.com/2024/01/05/tcp-ip/</loc><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/photo-1526374965328-7f61d4dc18c5.jpeg</image:loc><image:title>photo-1526374965328-7f61d4dc18c5</image:title></image:image><image:image><image:loc>https://cybersecuritypassion.com/wp-content/uploads/2024/01/tcpip.png</image:loc><image:title>tcpip</image:title></image:image><lastmod>2024-01-06T12:13:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cybersecuritypassion.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-01-19T12:31:45+00:00</lastmod></url></urlset>
