<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gcil.baremetalcyber.com/</loc>
    <lastmod>2026-02-16T03:45:01Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes</loc>
    <lastmod>2026-02-16T03:45:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-02-16T03:45:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/recommended</loc>
    <lastmod>2026-02-16T03:45:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-02-16T03:45:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-02-16T03:45:01Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-1-decode-the-giac-gcil-exam-blueprint-and-what-it-really-tests</loc>
    <lastmod>2026-02-14T21:36:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-2-master-the-gcil-exam-format-scoring-proctoring-and-open-book-tactics</loc>
    <lastmod>2026-02-14T21:37:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-3-build-a-spoken-study-plan-that-matches-every-gcil-objective</loc>
    <lastmod>2026-02-14T21:37:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-4-exam-acronyms-high-yield-audio-reference-for-gcil-incident-leaders</loc>
    <lastmod>2026-02-14T21:37:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-5-essential-terms-plain-language-glossary-for-fast-incident-management-recall</loc>
    <lastmod>2026-02-14T21:38:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-6-apply-security-best-practices-to-strategically-prepare-for-cyber-incidents</loc>
    <lastmod>2026-02-14T21:38:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-7-build-incident-readiness-using-policies-playbooks-and-preapproved-decisions</loc>
    <lastmod>2026-02-14T21:38:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-8-operationalize-incident-preparation-with-logging-backups-access-and-asset-visibility</loc>
    <lastmod>2026-02-14T21:38:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-9-design-the-incident-management-team-roles-authority-and-escalation-paths</loc>
    <lastmod>2026-02-14T21:39:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-10-organize-for-efficiency-raci-handoffs-and-clear-ownership-of-tasks</loc>
    <lastmod>2026-02-14T21:39:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-11-prioritize-team-wellbeing-during-incidents-with-burnout-prevention-and-recovery</loc>
    <lastmod>2026-02-14T21:39:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-12-plan-training-that-sticks-skills-matrices-and-just-in-time-refreshers</loc>
    <lastmod>2026-02-14T21:40:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-13-run-cyber-exercises-that-improve-response-tabletop-functional-full-scale</loc>
    <lastmod>2026-02-14T21:40:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-14-turn-lessons-learned-into-capability-with-after-action-reviews-and-follow-through</loc>
    <lastmod>2026-02-14T21:40:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-15-spaced-retrieval-review-preparation-team-setup-and-training-key-moves</loc>
    <lastmod>2026-02-14T21:40:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-16-classify-the-incident-by-attack-type-to-set-response-goals</loc>
    <lastmod>2026-02-14T21:41:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-17-assess-team-ability-in-real-time-and-adjust-the-plan</loc>
    <lastmod>2026-02-14T21:41:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-18-outline-response-goals-that-balance-containment-recovery-and-business-impact</loc>
    <lastmod>2026-02-14T21:42:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-19-master-incident-tracking-tasking-owners-deadlines-and-status-accuracy</loc>
    <lastmod>2026-02-14T21:42:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-20-build-a-reliable-incident-timeline-for-decisions-evidence-and-updates</loc>
    <lastmod>2026-02-14T21:42:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-21-establish-secure-stakeholder-communications-without-leaking-sensitive-incident-data</loc>
    <lastmod>2026-02-14T21:43:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-22-control-the-message-briefings-updates-and-consistent-terminology-under-stress</loc>
    <lastmod>2026-02-14T21:43:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-23-interact-with-attackers-safely-communication-boundaries-and-decision-triggers</loc>
    <lastmod>2026-02-14T21:43:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-24-spaced-retrieval-review-assessment-tracking-and-communications-under-pressure</loc>
    <lastmod>2026-02-14T21:44:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-25-write-incident-reports-that-matter-from-executive-summary-to-technical-detail</loc>
    <lastmod>2026-02-14T21:44:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-26-deliver-compliance-ready-incident-reporting-by-capturing-what-auditors-expect</loc>
    <lastmod>2026-02-14T21:44:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-27-identify-root-cause-without-guessing-evidence-driven-incident-remediation</loc>
    <lastmod>2026-02-14T21:44:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-28-lead-recovery-confidently-restore-services-validate-trust-and-prevent-relapse</loc>
    <lastmod>2026-02-14T21:45:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-29-close-the-incident-properly-closure-criteria-sign-offs-and-final-documentation</loc>
    <lastmod>2026-02-14T21:45:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-30-measure-incident-management-effectiveness-using-metrics-leaders-actually-use</loc>
    <lastmod>2026-02-14T21:45:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-31-improve-the-incident-management-process-reduce-friction-increase-speed-raise-quality</loc>
    <lastmod>2026-02-14T21:46:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-32-leverage-current-tools-to-strengthen-incident-management-without-overreliance</loc>
    <lastmod>2026-02-14T21:46:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-33-spaced-retrieval-review-reporting-remediation-closure-and-process-improvement</loc>
    <lastmod>2026-02-14T21:46:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-34-connect-vulnerability-management-strategy-to-incident-outcomes-and-risk-reduction</loc>
    <lastmod>2026-02-14T21:47:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-35-leverage-threat-intelligence-and-vulnerability-data-to-prioritize-remediation</loc>
    <lastmod>2026-02-14T21:47:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-36-operationalize-threat-and-vulnerability-management-during-active-incident-response</loc>
    <lastmod>2026-02-14T21:47:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-37-spaced-retrieval-review-vulnerability-and-threat-management-prioritization-drills</loc>
    <lastmod>2026-02-14T21:48:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-38-differentiate-email-attacks-fast-phishing-bec-malware-and-impersonation</loc>
    <lastmod>2026-02-14T21:48:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-39-explain-email-attack-methodology-and-impact-from-inbox-to-compromise</loc>
    <lastmod>2026-02-14T21:49:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-40-manage-an-email-attack-incident-contain-eradicate-recover-and-educate</loc>
    <lastmod>2026-02-14T21:49:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-41-differentiate-credential-attacks-stuffing-spraying-brute-force-and-theft</loc>
    <lastmod>2026-02-14T21:49:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-42-map-credential-attack-methodology-and-impact-across-accounts-and-systems</loc>
    <lastmod>2026-02-14T21:50:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-43-manage-credential-attack-incidents-lock-down-validate-access-restore-trust</loc>
    <lastmod>2026-02-14T21:50:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-44-spaced-retrieval-review-email-and-credential-attacks-rapid-recognition-practice</loc>
    <lastmod>2026-02-14T21:50:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-45-differentiate-cloud-attacks-using-shared-responsibility-and-misconfiguration-clues</loc>
    <lastmod>2026-02-14T21:51:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-46-describe-cloud-attack-methodology-and-impact-identity-data-and-service-abuse</loc>
    <lastmod>2026-02-14T21:51:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-47-manage-cloud-attack-incidents-contain-exposure-rotate-secrets-verify-recovery</loc>
    <lastmod>2026-02-14T21:51:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-48-differentiate-supply-chain-attacks-vendor-breach-dependency-poisoning-and-trust</loc>
    <lastmod>2026-02-14T21:52:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-49-explain-supply-chain-attack-methodology-and-impact-across-partners-and-products</loc>
    <lastmod>2026-02-14T21:52:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-50-manage-supply-chain-incidents-scope-blast-radius-coordinate-and-remediate</loc>
    <lastmod>2026-02-14T21:52:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-51-differentiate-ransomware-attacks-and-understand-the-business-stopper-impact</loc>
    <lastmod>2026-02-14T21:53:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-52-trace-ransomware-methodology-initial-access-privilege-gain-encryption-extortion</loc>
    <lastmod>2026-02-14T21:53:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-53-manage-ransomware-incidents-containment-recovery-choices-and-risk-tradeoffs</loc>
    <lastmod>2026-02-14T21:53:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-54-handle-ransomware-communications-stakeholders-attackers-and-legal-coordination</loc>
    <lastmod>2026-02-14T21:53:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-55-spaced-retrieval-review-cloud-supply-chain-and-ransomware-attack-playbooks</loc>
    <lastmod>2026-02-14T21:54:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-56-exam-day-tactics-and-mental-models-for-calm-gcil-decision-making</loc>
    <lastmod>2026-02-14T21:54:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-57-final-blueprint-rapid-recall-hit-every-objective-in-one-pass</loc>
    <lastmod>2026-02-14T21:54:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/episode-58-last-mile-confidence-check-common-gcil-pitfalls-and-how-to-avoid-them</loc>
    <lastmod>2026-02-14T21:54:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcil.baremetalcyber.com/episodes/welcome-to-the-giac-gcil-audio-course</loc>
    <lastmod>2026-02-14T21:55:24Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
