<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://academy.thecyberhut.com/archive</loc><changefreq>daily</changefreq></url><url><loc>https://academy.thecyberhut.com/about</loc><changefreq>weekly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/39-what-is-just-in-time-access-and</loc><lastmod>2026-02-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/black-friday-2025-20-off-training</loc><lastmod>2025-12-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/38-how-does-identity-and-access-management</loc><lastmod>2026-02-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/37-what-is-identity-risk-management</loc><lastmod>2025-11-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/36-what-is-identity-data-management</loc><lastmod>2025-10-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/35-what-are-initial-access-brokers</loc><lastmod>2025-09-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/34-what-is-spiffe</loc><lastmod>2025-08-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/33-what-role-does-ai-play-in-iam</loc><lastmod>2025-07-03</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/32-what-is-a-device-fingerprint</loc><lastmod>2025-06-05</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/31-what-is-continuous-authentication</loc><lastmod>2025-03-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/30-what-are-separation-of-duties</loc><lastmod>2025-01-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/29-what-is-session-management</loc><lastmod>2025-01-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/28-what-is-identity-threat-detection</loc><lastmod>2024-11-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/study-guide-b2c-ciam</loc><lastmod>2025-02-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/27-what-is-the-role-of-cryptography</loc><lastmod>2024-09-24</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/26-what-are-the-nist-800-63-identity</loc><lastmod>2024-09-16</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/25-what-is-a-otp</loc><lastmod>2024-09-09</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/24-what-is-consent-management</loc><lastmod>2024-09-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/23-what-is-fido</loc><lastmod>2024-07-28</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/22-a-primer-on-biometric-authentication</loc><lastmod>2024-06-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/21-what-is-a-jwt</loc><lastmod>2024-09-04</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/20-what-is-oidc</loc><lastmod>2024-04-29</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/19-what-is-oauth2</loc><lastmod>2024-04-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/18-what-is-rebac</loc><lastmod>2024-04-12</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/17-what-is-pbac</loc><lastmod>2024-03-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/16-what-is-abac</loc><lastmod>2024-03-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/15-what-is-rbac</loc><lastmod>2024-03-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/14-what-is-an-identity-profile-store</loc><lastmod>2024-02-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/13-what-is-federation</loc><lastmod>2024-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/12a-what-is-the-market-for-privileged</loc><lastmod>2023-12-30</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/12-what-is-pam</loc><lastmod>2024-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/11-what-is-identity-provisioning</loc><lastmod>2024-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/10-what-is-sso</loc><lastmod>2024-02-13</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/9a-what-is-the-market-for-identity</loc><lastmod>2023-11-01</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/9-what-is-identity-proofing</loc><lastmod>2023-10-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/8a-what-is-the-market-for-identity</loc><lastmod>2023-09-22</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/8-what-is-identity-governance-and</loc><lastmod>2023-10-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/7a-whats-the-market-for-external</loc><lastmod>2023-09-08</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/7-what-is-authorization</loc><lastmod>2023-09-23</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/6b-what-is-the-market-for-hardware</loc><lastmod>2023-08-25</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/6a-whats-the-market-for-software</loc><lastmod>2023-08-21</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/6-what-is-authentication</loc><lastmod>2023-09-07</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/5-what-is-b2c-iam</loc><lastmod>2023-09-02</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/4-what-is-b2e-iam</loc><lastmod>2023-08-26</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/3-what-is-iam</loc><lastmod>2023-08-19</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/2-why-is-digital-identity-so-important</loc><lastmod>2023-08-17</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/1-what-is-an-identity</loc><lastmod>2024-12-20</lastmod><changefreq>monthly</changefreq></url><url><loc>https://academy.thecyberhut.com/p/hello-world-an-introduction-to-iam</loc><lastmod>2025-04-29</lastmod><changefreq>monthly</changefreq></url></urlset>