<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://qsa.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/academy-course-hub</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T03:58:35Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/welcome-to-certified-the-pci-qualified-security-assessor-qsa-audio-course</loc>
    <lastmod>2026-03-29T16:56:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-1-crack-the-qsa-blueprint-and-unlock-what-really-counts</loc>
    <lastmod>2026-03-29T16:57:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-2-master-scoring-rules-policies-and-winning-exam-tactics</loc>
    <lastmod>2026-03-29T16:57:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-3-build-a-spoken-study-plan-you-ll-actually-follow</loc>
    <lastmod>2026-03-29T16:57:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-4-map-the-pci-ssc-universe-with-total-confidence</loc>
    <lastmod>2026-03-29T16:58:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-5-embrace-the-qsa-role-and-live-its-ethics</loc>
    <lastmod>2026-03-29T16:58:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-6-define-scope-and-lock-down-cde-boundaries</loc>
    <lastmod>2026-03-29T16:59:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-7-trace-every-cardholder-data-flow-without-guesswork</loc>
    <lastmod>2026-03-29T16:59:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-8-use-network-segmentation-to-shrink-scope-dramatically</loc>
    <lastmod>2026-03-29T16:59:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-9-apply-smart-sampling-and-bulletproof-evidence-strategies</loc>
    <lastmod>2026-03-29T17:00:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-10-choose-defined-or-customized-approaches-with-precision</loc>
    <lastmod>2026-03-29T17:00:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-11-perform-targeted-risk-analyses-that-stand-up</loc>
    <lastmod>2026-03-29T17:01:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-12-manage-compensating-controls-the-right-way-every-time</loc>
    <lastmod>2026-03-29T17:01:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-13-govern-third-party-service-providers-without-blind-spots</loc>
    <lastmod>2026-03-29T17:01:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-14-navigate-cloud-and-virtualization-scope-like-a-pro</loc>
    <lastmod>2026-03-29T17:01:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-15-slash-scope-using-tokenization-and-true-p2pe</loc>
    <lastmod>2026-03-29T17:02:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-16-select-the-right-saq-or-roc-path-confidently</loc>
    <lastmod>2026-03-29T17:02:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-17-plan-interviews-that-surface-clear-defensible-evidence</loc>
    <lastmod>2026-03-29T17:02:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-18-write-rocs-and-aocs-that-read-crystal-clear</loc>
    <lastmod>2026-03-29T17:03:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-19-architect-network-security-controls-that-actually-hold</loc>
    <lastmod>2026-03-29T17:04:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-20-enforce-secure-system-configurations-across-every-platform</loc>
    <lastmod>2026-03-29T17:06:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-21-protect-stored-account-data-with-zero-doubt</loc>
    <lastmod>2026-03-29T17:07:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-22-encrypt-cardholder-data-in-transit-end-to-end</loc>
    <lastmod>2026-03-29T17:07:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-23-prevent-and-detect-malware-before-it-wrecks-you</loc>
    <lastmod>2026-03-29T17:07:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-24-run-a-secure-software-lifecycle-that-delivers</loc>
    <lastmod>2026-03-29T17:07:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-25-limit-access-strictly-to-business-need-to-know</loc>
    <lastmod>2026-03-29T17:07:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-26-strengthen-user-authentication-so-only-the-right-people-in</loc>
    <lastmod>2026-03-29T17:07:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-27-control-physical-access-with-tight-auditable-measures</loc>
    <lastmod>2026-03-29T17:07:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-28-log-and-monitor-access-events-that-matter-most</loc>
    <lastmod>2026-03-29T17:08:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-29-test-security-regularly-and-prove-it-works</loc>
    <lastmod>2026-03-29T17:08:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-30-govern-the-program-so-security-becomes-routine</loc>
    <lastmod>2026-03-29T17:08:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-31-validate-e-commerce-and-web-payments-without-surprises</loc>
    <lastmod>2026-03-29T17:08:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-32-execute-asv-scans-that-pass-and-provide-value</loc>
    <lastmod>2026-03-29T17:08:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-33-conduct-penetration-tests-and-prove-segmentation-effectiveness</loc>
    <lastmod>2026-03-29T17:08:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-34-operate-cryptographic-key-management-with-zero-missteps</loc>
    <lastmod>2026-03-29T17:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-35-monitor-effectively-with-siem-alerts-and-triage</loc>
    <lastmod>2026-03-29T17:09:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-36-prepare-incident-response-and-forensics-that-deliver-clarity</loc>
    <lastmod>2026-03-29T17:09:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-37-make-compliance-truly-business-as-usual-all-year</loc>
    <lastmod>2026-03-29T17:09:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-38-triage-common-noncompliance-findings-with-calm-authority</loc>
    <lastmod>2026-03-29T17:09:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-39-calibrate-vulnerability-severity-and-prioritize-real-risk</loc>
    <lastmod>2026-03-29T17:12:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-40-align-testing-frequencies-and-triggers-to-reality</loc>
    <lastmod>2026-03-29T17:12:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-41-validate-wireless-and-remote-access-without-weak-links</loc>
    <lastmod>2026-03-29T17:12:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-42-control-change-and-release-pipelines-without-chaos</loc>
    <lastmod>2026-03-29T17:13:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-43-implement-file-integrity-monitoring-that-catches-the-drift</loc>
    <lastmod>2026-03-29T17:13:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-44-synchronize-system-time-reliably-across-the-environment</loc>
    <lastmod>2026-03-29T17:13:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-45-harden-databases-and-mask-pan-everywhere-it-lives</loc>
    <lastmod>2026-03-29T17:13:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-46-control-vendor-and-support-access-with-guardrails</loc>
    <lastmod>2026-03-29T17:13:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-47-verify-payment-terminals-meet-pts-the-smart-way</loc>
    <lastmod>2026-03-29T17:13:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-48-assess-mobile-and-contactless-payments-for-hidden-risks</loc>
    <lastmod>2026-03-29T17:13:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-49-protect-payment-pages-and-kill-malicious-script-skimmers</loc>
    <lastmod>2026-03-29T17:13:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-50-manage-certificates-and-tls-lifecycles-without-expiry-drama</loc>
    <lastmod>2026-03-29T17:14:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-51-build-clear-shared-responsibility-matrices-that-work</loc>
    <lastmod>2026-03-29T17:14:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-52-set-data-retention-and-purging-that-reduces-scope</loc>
    <lastmod>2026-03-29T17:14:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-53-meet-the-qsa-qa-program-with-confidence</loc>
    <lastmod>2026-03-29T17:14:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-54-compare-tokenization-and-encryption-to-choose-wisely</loc>
    <lastmod>2026-03-29T17:14:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-55-scope-serverless-and-containerized-workloads-without-gaps</loc>
    <lastmod>2026-03-29T17:14:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-56-handle-evidence-and-documentation-safely-and-systematically</loc>
    <lastmod>2026-03-29T17:14:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-57-avoid-classic-roc-writing-pitfalls-examiners-hate</loc>
    <lastmod>2026-03-29T17:15:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://qsa.baremetalcyber.com/episodes/episode-58-lightning-recap-of-core-controls-and-must-knows</loc>
    <lastmod>2026-03-29T17:15:15Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
