<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cyberpad.pages.dev/</loc>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/leerpad.html</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules.html</loc>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/labs.html</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/tools.html</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/community.html</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/certificaten.html</loc>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/01-basis-it-netwerken.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/02-linux-fundamentals.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/03-web-fundamentals.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/04-inleiding-cybersecurity.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/05-ethical-hacking-basis.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/06-reconnaissance.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/07-scanning-enumeration.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/08-vulnerability-assessment.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/09-exploitation-metasploit.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/10-web-application-hacking.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/11-wireless-wifi-hacking.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/12-social-engineering.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/13-password-attacks.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/14-post-exploitation.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/15-malware-reverse-engineering.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/16-forensics-incident-response.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/17-blue-team-red-team.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/18-advanced-threats.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/19-bug-bounty-hunting.html</loc>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberpad.pages.dev/modules/20-career-certificeringen.html</loc>
    <priority>0.7</priority>
  </url>
</urlset>
