<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gcti.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T21:41:32Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-1-conquer-the-gcti-blueprint</loc>
    <lastmod>2026-02-14T15:45:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-2-decode-scoring-timing-proctoring-and-hidden-pitfalls</loc>
    <lastmod>2026-02-14T15:45:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-3-build-a-winning-audio-only-study-routine</loc>
    <lastmod>2026-02-14T15:45:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-4-grasp-threat-intelligence-essentials-with-real-world-focus</loc>
    <lastmod>2026-02-14T15:46:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-5-separate-strategic-operational-and-tactical-intelligence-fast</loc>
    <lastmod>2026-02-14T15:46:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-6-master-the-full-intelligence-cycle-without-busywork</loc>
    <lastmod>2026-02-14T15:46:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-7-profile-threat-actors-motives-and-constraints-that-matter</loc>
    <lastmod>2026-02-14T15:46:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-8-write-crisp-intelligence-requirements-stakeholders-love</loc>
    <lastmod>2026-02-14T15:46:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-9-pick-high-value-sources-and-skip-the-noise</loc>
    <lastmod>2026-02-14T15:47:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-10-read-network-telemetry-for-signals-that-count</loc>
    <lastmod>2026-02-14T15:47:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-11-turn-messy-logs-into-decision-ready-insights</loc>
    <lastmod>2026-02-14T15:47:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-12-pull-forensic-artifacts-that-advance-your-hypothesis</loc>
    <lastmod>2026-02-14T15:48:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-13-make-external-threat-feeds-actually-pay-off</loc>
    <lastmod>2026-02-14T15:48:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-14-mine-internal-telemetry-for-durable-intelligence-wins</loc>
    <lastmod>2026-02-14T15:48:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-15-extract-domain-intelligence-that-drives-confident-pivots</loc>
    <lastmod>2026-02-14T15:48:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-16-exploit-certificate-transparency-for-stealthy-infrastructure-clues</loc>
    <lastmod>2026-02-14T15:48:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-17-normalize-incoming-data-so-patterns-pop-out</loc>
    <lastmod>2026-02-14T15:51:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-18-deduplicate-cleanse-and-harden-your-datasets</loc>
    <lastmod>2026-02-14T15:51:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-19-govern-retention-access-and-evidence-integrity</loc>
    <lastmod>2026-02-14T15:51:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-20-exam-acronyms-quick-audio-reference-you-ll-reuse</loc>
    <lastmod>2026-02-14T15:51:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-21-systematize-collection-with-repeatable-scalable-workflows</loc>
    <lastmod>2026-02-14T15:52:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-22-review-checkpoint-foundations-locked-and-loaded</loc>
    <lastmod>2026-02-14T15:52:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-23-use-structured-analytic-techniques-that-sharpen-judgment</loc>
    <lastmod>2026-02-14T15:52:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-24-defeat-cognitive-bias-before-it-misleads-you</loc>
    <lastmod>2026-02-14T15:52:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-25-rate-sources-and-evidence-with-discipline</loc>
    <lastmod>2026-02-14T15:52:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-26-synthesize-multi-source-findings-into-one-clear-story</loc>
    <lastmod>2026-02-14T15:52:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-27-state-confidence-and-uncertainty-like-a-pro</loc>
    <lastmod>2026-02-14T15:52:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-28-form-testable-hypotheses-that-survive-scrutiny</loc>
    <lastmod>2026-02-14T15:52:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-29-avoid-analytic-pitfalls-that-sink-good-teams</loc>
    <lastmod>2026-02-14T15:52:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-30-triage-indicators-into-true-intelligence-value</loc>
    <lastmod>2026-02-14T15:53:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-31-pivot-from-domains-to-infrastructure-with-intent</loc>
    <lastmod>2026-02-14T15:53:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-32-run-link-analysis-that-reveals-hidden-clusters</loc>
    <lastmod>2026-02-14T15:54:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-33-exploit-passive-dns-for-historical-context</loc>
    <lastmod>2026-02-14T15:54:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-34-leverage-whois-and-registration-breadcrumbs-smartly</loc>
    <lastmod>2026-02-14T15:54:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-35-cluster-weak-signals-into-compelling-hypotheses</loc>
    <lastmod>2026-02-14T15:54:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-36-validate-every-pivot-without-chasing-ghosts</loc>
    <lastmod>2026-02-14T15:54:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-37-review-boost-analysis-and-pivoting-mastery</loc>
    <lastmod>2026-02-14T15:54:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-38-read-malware-behavior-to-surface-adversary-goals</loc>
    <lastmod>2026-02-14T15:54:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-39-extract-static-malware-features-that-travel-well</loc>
    <lastmod>2026-02-14T15:54:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-40-pivot-on-malware-metadata-for-campaign-reach</loc>
    <lastmod>2026-02-14T15:54:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-41-connect-malware-families-to-credible-campaigns</loc>
    <lastmod>2026-02-14T15:55:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-42-prioritize-malware-driven-tasks-for-maximum-impact</loc>
    <lastmod>2026-02-14T15:55:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-43-analyze-intrusions-through-the-kill-chain-lens</loc>
    <lastmod>2026-02-14T15:55:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-44-model-intrusions-with-the-diamond-for-clarity</loc>
    <lastmod>2026-02-14T15:55:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-45-select-courses-of-action-that-change-outcomes</loc>
    <lastmod>2026-02-14T15:55:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-46-blend-multiple-models-to-strengthen-conclusions</loc>
    <lastmod>2026-02-14T15:55:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-47-turn-abstract-models-into-defender-guidance</loc>
    <lastmod>2026-02-14T15:55:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-48-pressure-test-conclusions-before-they-reach-leaders</loc>
    <lastmod>2026-02-14T15:55:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-49-profile-campaigns-with-evidence-and-restraint</loc>
    <lastmod>2026-02-14T15:55:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-50-build-timelines-that-expose-adversary-cadence</loc>
    <lastmod>2026-02-14T15:56:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-51-track-adversary-ttps-to-anticipate-moves</loc>
    <lastmod>2026-02-14T15:56:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-52-weigh-attribution-tradeoffs-and-avoid-overreach</loc>
    <lastmod>2026-02-14T15:56:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-53-calibrate-attribution-confidence-with-sober-language</loc>
    <lastmod>2026-02-14T15:56:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-54-present-attribution-responsibly-to-decision-makers</loc>
    <lastmod>2026-02-14T15:56:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-55-reassess-attribution-as-new-signals-emerge</loc>
    <lastmod>2026-02-14T15:56:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-56-manage-attribution-bias-and-external-pressure</loc>
    <lastmod>2026-02-14T15:56:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-57-operationalize-intelligence-for-frontline-defenders</loc>
    <lastmod>2026-02-14T15:56:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-58-drive-detection-engineering-with-intel-requirements</loc>
    <lastmod>2026-02-14T15:57:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-59-enable-proactive-threat-hunting-that-finds-needles</loc>
    <lastmod>2026-02-14T15:57:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-60-write-decision-focused-reports-leaders-actually-read</loc>
    <lastmod>2026-02-14T15:57:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-61-measure-intelligence-impact-with-meaningful-feedback</loc>
    <lastmod>2026-02-14T15:57:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-62-share-intelligence-through-trusted-auditable-processes</loc>
    <lastmod>2026-02-14T15:57:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-63-exchange-intelligence-using-standards-that-travel</loc>
    <lastmod>2026-02-14T15:57:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-64-handle-sensitivities-and-caveats-without-friction</loc>
    <lastmod>2026-02-14T15:57:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-65-close-stakeholder-feedback-loops-for-iteration</loc>
    <lastmod>2026-02-14T15:57:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-66-deliver-high-impact-briefings-under-time-pressure</loc>
    <lastmod>2026-02-14T15:58:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/episode-67-exam-day-tactics-to-maximize-your-score</loc>
    <lastmod>2026-02-14T15:58:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gcti.baremetalcyber.com/episodes/welcome-to-the-giac-gcti-audio-course</loc>
    <lastmod>2026-02-08T17:39:36Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
