<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://quartz.jzhao.xyz/00-introduction-to-cybersecurity</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/01-1-osint-cheatsheet</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/01-2-report-template</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/01-osint</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/02-linux</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/03-1-deploy-metasploitable-2</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/03-report-creation</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/04-1-threat-modeling-base-case</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/04-threat-modeling</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/05-reverse-engineering</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/06-cryptography</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/07-malware-analysis</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/08-source-code-vulnerability-management</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/09-ethical-hacking</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/10-buffer-overflow</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/11-network-analysis</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/12-security-architecture</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/13-digital-forensics</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/14-web-application-security</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/15-automation</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/16-devsecops</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/glossary</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/resources</loc>
    <lastmod>2026-03-24T02:58:47.000Z</lastmod>
  </url></urlset>