<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7.1'-->
<!--Jetpack_Sitemap_Buffer_Image_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//legacyhaven.university/image-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://legacyhaven.university/lhafavicon256/</loc>
  <lastmod>2026-04-25T23:35:47Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/LHAfavicon256.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/lhafavicon256/</loc>
  <lastmod>2026-04-25T23:35:04Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/cropped-LHAfavicon256.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/raci-matrix-cybersecurity/</loc>
  <lastmod>2026-04-25T23:42:09Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/raci-matrix-cybersecurity-incident-response.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/zero-trust-architecture-cas-005/</loc>
  <lastmod>2026-04-26T10:47:55Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/high-level-zero-trust-architecture.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/zero-trust-architecture-cas-005/</loc>
  <lastmod>2026-04-26T10:51:31Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/microsegmentation-zero-trust-architecture.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/zero-trust-architecture-cas-005/</loc>
  <lastmod>2026-04-26T10:54:11Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/sase-sdwan-roles-zero-trust-architecture.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/post-quantum-cryptography-cas-005/</loc>
  <lastmod>2026-04-27T10:19:34Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/quantum-cryptography.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/cloud-security-securityx-casb-shadow-it-containers/</loc>
  <lastmod>2026-04-27T20:41:39Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/cloud-security-securityx-casb-architecture.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/cloud-security-securityx-casb-shadow-it-containers/</loc>
  <lastmod>2026-04-27T20:43:43Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/cloud-security-securityx-container-orchestration.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/cloud-security-securityx-casb-shadow-it-containers/</loc>
  <lastmod>2026-04-27T20:47:20Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/cloud-security-securityx-casb-shadow-it-containers.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/zero-trust/</loc>
  <lastmod>2026-04-28T09:02:52Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/zero-trust.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/threat-modeling-mitre-attck-matrix-overview/</loc>
  <lastmod>2026-04-28T10:42:44Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/threat-modeling-mitre-attck-matrix-overview.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/threat-modeling-mitre-attck-stride-diamond-model/</loc>
  <lastmod>2026-04-28T22:20:37Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/threat-modeling-diamond-model-intrusion-analysis.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/threat-modeling-mitre-attck-stride-diamond-model/</loc>
  <lastmod>2026-04-28T22:25:53Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/mitre-stride-diamond.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/882188e4-774c-4f4f-8f6e-04b2ab3ffd1c/</loc>
  <lastmod>2026-04-28T22:41:10Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/882188e4-774c-4f4f-8f6e-04b2ab3ffd1c.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://legacyhaven.university/certification-pathways/</loc>
  <lastmod>2026-04-28T23:21:30Z</lastmod>
  <image:image>
   <image:loc>https://legacyhaven.university/wp-content/uploads/2026/04/grok-image-9d925f77-2024-4094-93f4-fa69dfbc76b4.jpg</image:loc>
  </image:image>
 </url>
</urlset>
