<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://pcip.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T22:31:28Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/welcome-to-the-pcip-exam-audio-course</loc>
    <lastmod>2025-11-06T03:47:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-50-recap-the-complete-pcip-blueprint-for-lasting-mastery</loc>
    <lastmod>2025-11-06T03:18:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-49-nail-exam-day-tactics-for-maximum-score-potential</loc>
    <lastmod>2025-11-06T03:18:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-48-navigate-card-production-and-personalization-security-requirements</loc>
    <lastmod>2025-11-06T03:18:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-47-recognize-essentials-of-pin-and-pts-security-standards</loc>
    <lastmod>2025-11-06T03:17:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-46-train-teams-to-think-securely-and-act-consistently</loc>
    <lastmod>2025-11-06T03:17:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-45-assign-pci-roles-and-measurable-accountability-organization-wide</loc>
    <lastmod>2025-11-06T03:16:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-44-strengthen-change-and-release-management-with-governance</loc>
    <lastmod>2025-11-06T03:16:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-43-validate-time-synchronization-and-preserve-forensic-quality-logs</loc>
    <lastmod>2025-11-06T03:15:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-42-minimize-data-retention-and-purge-securely-on-schedule</loc>
    <lastmod>2025-11-06T03:15:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-41-control-vendor-remote-access-with-strict-guardrails</loc>
    <lastmod>2025-11-06T03:14:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-40-harden-pos-devices-and-field-hardware-against-compromise</loc>
    <lastmod>2025-11-06T03:14:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-39-protect-payment-pages-from-skimming-injection-and-tampering</loc>
    <lastmod>2025-11-06T03:13:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-38-understand-and-navigate-the-pci-software-security-framework</loc>
    <lastmod>2025-11-06T03:13:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-37-sustain-year-round-pci-compliance-without-audit-fatigue</loc>
    <lastmod>2025-11-06T03:12:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-36-execute-an-incident-response-that-contains-damage-quickly</loc>
    <lastmod>2025-11-06T03:12:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-35-orchestrate-penetration-tests-that-deliver-actionable-evidence</loc>
    <lastmod>2025-11-06T03:11:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-34-apply-compensating-controls-correctly-and-document-convincingly</loc>
    <lastmod>2025-11-06T03:11:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-33-triage-vulnerabilities-and-tough-asv-findings-decisively</loc>
    <lastmod>2025-11-06T03:10:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-32-deploy-p2pe-correctly-and-manage-cryptographic-keys-responsibly</loc>
    <lastmod>2025-11-06T03:10:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-31-leverage-tokenization-and-vaulting-to-cut-exposure</loc>
    <lastmod>2025-11-06T03:09:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-30-right-size-cloud-and-virtualization-scope-with-evidence</loc>
    <lastmod>2025-11-06T03:09:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-29-lock-down-wireless-networks-and-remote-access-pathways</loc>
    <lastmod>2025-11-06T03:08:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-28-secure-e-commerce-pages-and-third-party-scripts-thoroughly</loc>
    <lastmod>2025-11-06T03:07:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-27-lead-with-policy-and-a-living-security-program</loc>
    <lastmod>2025-11-06T03:07:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-26-test-segmentation-and-controls-for-credible-assurance</loc>
    <lastmod>2025-11-06T03:06:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-25-monitor-logs-with-intent-and-respond-to-signals</loc>
    <lastmod>2025-11-06T03:06:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-24-guard-physical-access-to-cardholder-areas-relentlessly</loc>
    <lastmod>2025-11-06T03:06:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-23-make-multifactor-authentication-resilient-and-user-friendly</loc>
    <lastmod>2025-11-06T03:05:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-22-enforce-least-privilege-access-across-systems-and-roles</loc>
    <lastmod>2025-11-06T03:05:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-21-build-and-release-software-using-secure-development-practices</loc>
    <lastmod>2025-11-06T03:04:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-20-stop-malware-early-using-layered-protective-defenses</loc>
    <lastmod>2025-11-06T03:04:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-19-encrypt-data-in-transit-across-every-open-pathway</loc>
    <lastmod>2025-11-06T03:03:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-18-shield-stored-account-data-from-theft-and-misuse</loc>
    <lastmod>2025-11-06T03:03:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-17-lock-down-secure-configurations-across-servers-and-endpoints</loc>
    <lastmod>2025-11-06T03:02:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-16-fortify-network-security-controls-against-real-world-attacks</loc>
    <lastmod>2025-11-06T03:02:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-15-run-targeted-risk-analyses-that-withstand-tough-scrutiny</loc>
    <lastmod>2025-11-06T03:01:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-14-apply-the-customized-approach-correctly-from-start-to-finish</loc>
    <lastmod>2025-11-06T03:01:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-13-prepare-roc-and-aoc-submissions-that-actually-pass</loc>
    <lastmod>2025-11-06T03:01:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-12-choose-the-correct-saq-for-your-payment-channels</loc>
    <lastmod>2025-11-06T03:00:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-11-control-third-party-service-risk-with-enforceable-contracts</loc>
    <lastmod>2025-11-06T03:00:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-10-shrink-assessment-scope-using-proven-scoping-strategies</loc>
    <lastmod>2025-11-06T02:59:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-9-pinpoint-pci-scope-and-network-segmentation-with-certainty</loc>
    <lastmod>2025-11-06T02:59:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-8-map-payment-data-flows-from-capture-to-disposal</loc>
    <lastmod>2025-11-06T02:58:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-7-define-cardholder-and-sensitive-authentication-data-precisely</loc>
    <lastmod>2025-11-06T02:58:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-6-track-card-brands-and-program-obligations-the-smart-way</loc>
    <lastmod>2025-11-06T02:57:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-5-distinguish-merchants-versus-service-providers-without-hesitation</loc>
    <lastmod>2025-11-06T02:57:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-4-navigate-the-pci-standards-landscape-with-practical-precision</loc>
    <lastmod>2025-11-06T02:56:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-3-outsmart-tricky-pcip-questions-under-real-exam-pressure</loc>
    <lastmod>2025-11-06T02:54:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-2-craft-a-high-impact-spoken-study-plan-that-sticks</loc>
    <lastmod>2025-11-06T02:52:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://pcip.baremetalcyber.com/episodes/episode-1-crack-the-pcip-exam-with-clarity-and-confidence</loc>
    <lastmod>2025-11-06T02:52:11Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
