<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyberclarityhq.com/resume/</loc><lastmod>2026-02-09T04:12:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/business-database-system/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/dbms.png</image:loc><image:title>dbms</image:title></image:image><lastmod>2025-12-02T06:30:06+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/disk-analysis-autopsy-writeup-report/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss7_wallpapererrorp.png</image:loc><image:title>autTHM_ss7_WallPaperErrorP</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss7_wallpaper.png</image:loc><image:title>autTHM_ss7_WallPaper</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss6_coords.png</image:loc><image:title>autTHM_ss6_Coords</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss6_netcard.png</image:loc><image:title>autTHM_ss6_NetCard</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss5_mac.png</image:loc><image:title>autTHM_ss5_MAC</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss5_ip.png</image:loc><image:title>autTHM_ss5_IP</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss4_last_login.png</image:loc><image:title>autTHM_ss4_last_login</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss3_users.png</image:loc><image:title>autTHM_ss3_users</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss2_pcname.png</image:loc><image:title>autTHM_ss2_pcName</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/autthm_ss1_md5.png</image:loc><image:title>autTHM_ss1_md5</image:title></image:image><lastmod>2025-11-23T02:06:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/blog-post/</loc><lastmod>2025-09-13T20:05:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/analyze-a-vulnerable-system-for-a-small-business-project/</loc><lastmod>2025-09-13T20:03:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/connect-with-me/</loc><lastmod>2025-09-13T15:09:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/building-policies-from-scratch-grc-project/</loc><lastmod>2025-09-13T15:08:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/linux-commands-to-manage-files/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/09/ss4_linuxcmds.png</image:loc><image:title>SS4_LinuxCmds</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/09/ss3_linuxcmds.png</image:loc><image:title>SS3_LinuxCmds</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/09/ss2_linuxcmds.png</image:loc><image:title>SS2_LinuxCmds</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/09/ss1_linuxcmds.png</image:loc><image:title>SS1_LinuxCmds</image:title></image:image><lastmod>2025-09-10T00:52:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/about/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/img_2878.jpg</image:loc><image:title>IMG_2878</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/240_f_557389202_qxonvswtwpncwhoy31myjkddykj15tyh.jpg</image:loc><image:title>240_F_557389202_QXoNvswTwpNcWHoy31mYjKddYkj15TYh</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/img_6559.jpg</image:loc><image:title>Screenshot</image:title><image:caption>Screenshot</image:caption></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/img_6455.jpg</image:loc><image:title>IMG_6455</image:title></image:image><lastmod>2025-08-19T04:37:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/wazuh-soar-integration-technical-implementation-report/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/sshputtyconnection.png</image:loc><image:title>SSHPuTTYconnection</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/firewallrules.png</image:loc><image:title>firewallrules</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/wazuh-soar-diagram.drawio-2.png</image:loc><image:title>Wazuh SOAR Diagram.drawio</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/wazuh-soar-diagram.drawio-1.png</image:loc><image:title>Wazuh SOAR Diagram.drawio</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/wazuh-soar-diagram.drawio.png</image:loc><image:title>Wazuh SOAR Diagram.drawio</image:title></image:image><lastmod>2025-08-18T03:19:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/2025/08/12/projects/</loc><lastmod>2025-08-12T14:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberclarityhq.com/conti-ransomware-splunk-writeup/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss11_webshell.png</image:loc><image:title>contiTHM_ss11_webshell</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss10_hashextract.png</image:loc><image:title>contiTHM_ss10_hashextract</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss9_sourcentargetimage.png</image:loc><image:title>contiTHM_ss9_sourceNtargetImage</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss8_cmdline_secninja.png</image:loc><image:title>contiTHM_ss8_cmdline_secninja</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss7_search_filesaves.png</image:loc><image:title>contiTHM_ss7_search_filesaves</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss6_virustotal.png</image:loc><image:title>contiTHM_ss6_virustotal</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss4_search_hash_found.png</image:loc><image:title>contiTHM_ss4_search_hash_found</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss4_search_time.png</image:loc><image:title>contiTHM_ss4_search_time</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss3_unusualloc.png</image:loc><image:title>contiTHM_ss3_unusualLoc</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/contithm_ss2_search.png</image:loc><image:title>contiTHM_ss2_search</image:title></image:image><lastmod>2025-08-12T14:39:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/cybersecurity-internship-write-up-2/</loc><lastmod>2025-08-09T22:38:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/cybersecurity-internship-tasks-1-2-niko/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/httpwstrafficniko.png</image:loc><image:title>httpWStrafficNiko</image:title></image:image><lastmod>2025-08-09T22:38:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/aig-shields-up-cybersecurity-sim/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/aigjobsimss3.png</image:loc><image:title>aigJobSimSS3</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/aigjobsimss2.png</image:loc><image:title>aigJobSimSS2</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/aigjobsimss1.png</image:loc><image:title>aigJobSimSS1</image:title></image:image><lastmod>2025-08-09T22:16:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/phishing-attempt-analysis-pdf/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/phishingemail2_anyrun_sample.png</image:loc><image:title>PhishingEmail2_anyrun_sample</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/08/phishingemail1_anyrun_sample.png</image:loc><image:title>PhishingEmail1_anyrun_sample</image:title></image:image><lastmod>2025-08-08T00:44:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/2025/07/15/crushing-the-comptia-trifecta-my-blueprint-for-passing-a-network-and-security/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/07/img_7533.jpg</image:loc><image:title>IMG_7533</image:title></image:image><lastmod>2025-07-15T17:01:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberclarityhq.com/steps-i-took-to-pass-the-comptia-network-exam-on-my-first-try/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/06/comptia_net_logo.png</image:loc><image:title>CompTIA_Net+_logo</image:title></image:image><lastmod>2025-06-28T21:06:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/how-i-passed-the-comptia-security-exam-on-my-first-try/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/screenshot-2025-05-27-at-10.35.31-pm.png</image:loc><image:title>Screenshot 2025-05-27 at 10.35.31 PM</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/images1.png</image:loc><image:title>images1</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/images1-1.png</image:loc><image:title>images1</image:title></image:image><lastmod>2025-05-30T01:33:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com/the-steps-i-took-to-pass-the-comptia-security-exam-on-my-first-try/</loc><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/comptia-security-certificate-2.png</image:loc><image:title>CompTIA Security+ certificate</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/comptia-security-certificate-1.png</image:loc><image:title>CompTIA Security+ certificate</image:title></image:image><image:image><image:loc>https://cyberclarityhq.com/wp-content/uploads/2025/05/comptia-security-certificate.png</image:loc><image:title>CompTIA Security+ certificate</image:title></image:image><lastmod>2025-05-30T01:27:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberclarityhq.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-09T04:12:40+00:00</lastmod></url></urlset>
