<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 2:03 am by All in One SEO v4.8.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://nyinst.academy/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>NYINST ACADEMY</title>
		<link><![CDATA[https://nyinst.academy]]></link>
		<description><![CDATA[NYINST ACADEMY]]></description>
		<lastBuildDate><![CDATA[Tue, 10 Sep 2024 13:41:44 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://nyinst.academy/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://nyinst.academy/post/]]></guid>
			<link><![CDATA[https://nyinst.academy/post/]]></link>
			<title>Post</title>
			<pubDate><![CDATA[Tue, 10 Sep 2024 13:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/]]></guid>
			<link><![CDATA[https://nyinst.academy/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 05 Aug 2025 14:05:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/]]></link>
			<title>Introduction to Cloud Computing and its Fundamental</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:06:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/product/introduction-to-cloud-computing-and-its-fundamental-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/product/introduction-to-cloud-computing-and-its-fundamental-2/]]></link>
			<title>Introduction to Cloud Computing and its Fundamental</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:06:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/research-assignment-predicting-the-next-big-thing-in-cloud-computing-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/research-assignment-predicting-the-next-big-thing-in-cloud-computing-2/]]></link>
			<title>Research Assignment: Predicting the Next Big Thing in Cloud Computing</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:05:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/the-economic-impact-of-cloud-computing-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/the-economic-impact-of-cloud-computing-2/]]></link>
			<title>The Economic Impact of Cloud Computing</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:05:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/emerging-technologies-in-cloud-computing-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/emerging-technologies-in-cloud-computing-2/]]></link>
			<title>Emerging Technologies in Cloud Computing</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:05:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/the-evolution-of-cloud-computing-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/the-evolution-of-cloud-computing-2/]]></link>
			<title>The Evolution of Cloud Computing</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:04:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/security-policy-development-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/security-policy-development-2/]]></link>
			<title>Security Policy Development</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:04:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/best-practices-for-cloud-security-and-compliance-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/best-practices-for-cloud-security-and-compliance-2/]]></link>
			<title>Best Practices for Cloud Security and Compliance</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:03:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/compliance-frameworks-and-regulations-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/compliance-frameworks-and-regulations-2/]]></link>
			<title>Compliance Frameworks and Regulations</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:03:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/introduction-to-cloud-security-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/introduction-to-cloud-security-2/]]></link>
			<title>Introduction to Cloud Security</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:03:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/comparing-cloud-service-models/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/comparing-cloud-service-models/]]></link>
			<title>Comparing Cloud Service Models</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:01:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/understanding-paas-solutions-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/understanding-paas-solutions-2/]]></link>
			<title>Understanding PaaS Solutions</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:01:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/deep-dive-into-iaas-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/deep-dive-into-iaas-2/]]></link>
			<title>Deep Dive into IaaS</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:01:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/introduction-to-cloud-service-models-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/introduction-to-cloud-service-models-2/]]></link>
			<title>Introduction to Cloud Service Models</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:00:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/case-study-analysis-selecting-a-cloud-service-model-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/case-study-analysis-selecting-a-cloud-service-model-2/]]></link>
			<title>Case Study Analysis: Selecting a Cloud Service Model</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/virtualization-and-its-role-in-cloud-architecture-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/virtualization-and-its-role-in-cloud-architecture-2/]]></link>
			<title>Virtualization and its Role in Cloud Architecture</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:59:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/understanding-service-models-iaas-paas-and-saas-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/understanding-service-models-iaas-paas-and-saas-2/]]></link>
			<title>Understanding Service Models: IaaS, PaaS, and SaaS</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:59:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/introduction-to-cloud-computing-architecture-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/introduction-to-cloud-computing-architecture-2/]]></link>
			<title>Introduction to Cloud Computing Architecture</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:59:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/cloud-computing-case-study-analysis-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/assignments/cloud-computing-case-study-analysis-2/]]></link>
			<title>Cloud Computing Case Study Analysis</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:58:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/public-private-and-hybrid-clouds-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/public-private-and-hybrid-clouds-2/]]></link>
			<title>Public, Private, and Hybrid Clouds</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:58:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/types-of-cloud-services-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/types-of-cloud-services-2/]]></link>
			<title>Types of Cloud Services</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:58:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/what-is-cloud-computing-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cloud-computing-and-its-fundamental/lessons/what-is-cloud-computing-2/]]></link>
			<title>What is Cloud Computing?</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:57:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/]]></link>
			<title>Introduction to Cybersecurity and types of Cyber Threats</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:53:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/product/introduction-to-cybersecurity-and-types-of-cyber-threats-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/product/introduction-to-cybersecurity-and-types-of-cyber-threats-2/]]></link>
			<title>Introduction to Cybersecurity and types of Cyber Threats</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:53:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/research-project-predicting-the-next-big-cybersecurity-challenge-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/research-project-predicting-the-next-big-cybersecurity-challenge-2/]]></link>
			<title>Research Project: Predicting the Next Big Cybersecurity Challenge</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:53:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/final-assessment-testing-your-cybersecurity-knowledge/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/final-assessment-testing-your-cybersecurity-knowledge/]]></link>
			<title>Final Assessment: Testing Your Cybersecurity Knowledge</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:52:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/the-future-of-cybersecurity-jobs-and-skills-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/the-future-of-cybersecurity-jobs-and-skills-2/]]></link>
			<title>The Future of Cybersecurity Jobs and Skills</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:52:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/emerging-trends-in-cybersecurity-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/emerging-trends-in-cybersecurity-2/]]></link>
			<title>Emerging Trends in Cybersecurity</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:52:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/recap-key-takeaways-in-cybersecurity-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/recap-key-takeaways-in-cybersecurity-2/]]></link>
			<title>Recap: Key Takeaways in Cybersecurity</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:52:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/best-practices-in-cybersecurity-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/best-practices-in-cybersecurity-2/]]></link>
			<title>Best Practices in Cybersecurity</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:51:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/create-a-mock-cybersecurity-policy-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/create-a-mock-cybersecurity-policy-2/]]></link>
			<title>Create a Mock Cybersecurity Policy</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:51:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/quiz-on-advanced-threat-mitigation-techniques/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/quiz-on-advanced-threat-mitigation-techniques/]]></link>
			<title>Quiz on Advanced Threat Mitigation Techniques</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:50:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/developing-security-policies-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/developing-security-policies-2/]]></link>
			<title>Developing Security Policies</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:50:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/introduction-to-cybersecurity-strategies-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/introduction-to-cybersecurity-strategies-2/]]></link>
			<title>Introduction to Cybersecurity Strategies</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:50:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/intrusion-detection-and-prevention-systems-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/intrusion-detection-and-prevention-systems-2/]]></link>
			<title>Intrusion Detection and Prevention Systems</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:49:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/configuring-a-firewall-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/configuring-a-firewall-2/]]></link>
			<title>Configuring a Firewall</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:49:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/quiz-on-network-security-tools/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/quiz-on-network-security-tools/]]></link>
			<title>Quiz on Network Security Tools</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:48:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/firewalls-the-first-line-of-defense-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/firewalls-the-first-line-of-defense-2/]]></link>
			<title>Firewalls: The First Line of Defense</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:48:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/introduction-to-cyber-defense-mechanisms-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/introduction-to-cyber-defense-mechanisms-2/]]></link>
			<title>Introduction to Cyber Defense Mechanisms</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/case-study-analyzing-a-real-world-cyber-threat/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/case-study-analyzing-a-real-world-cyber-threat/]]></link>
			<title>Case Study: Analyzing a Real-World Cyber Threat</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:47:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/case-study-analyzing-a-real-world-cyber-threat-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/case-study-analyzing-a-real-world-cyber-threat-2/]]></link>
			<title>Case Study: Analyzing a Real-World Cyber Threat</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:47:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/cyber-threat-identification-quiz-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/cyber-threat-identification-quiz-2/]]></link>
			<title>Cyber Threat Identification Quiz</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:46:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/malware-types-and-tactics-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/malware-types-and-tactics-2/]]></link>
			<title>Malware: Types and Tactics</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:42:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/introduction-to-cyber-threats-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/introduction-to-cyber-threats-2/]]></link>
			<title>Introduction to Cyber Threats</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:42:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/cybersecurity-news-analysis-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/assignments/cybersecurity-news-analysis-2/]]></link>
			<title>Cybersecurity News Analysis</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:41:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/basics-of-cybersecurity-quiz/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/quizzes/basics-of-cybersecurity-quiz/]]></link>
			<title>Basics of Cybersecurity Quiz</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:41:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/types-of-cyber-threats-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/types-of-cyber-threats-2/]]></link>
			<title>Types of Cyber Threats</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:41:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/historical-context-of-cybersecurity-2/]]></guid>
			<link><![CDATA[https://nyinst.academy/nyinst-courses/introduction-to-cybersecurity-and-types-of-cyber-threats-2/lessons/historical-context-of-cybersecurity-2/]]></link>
			<title>Historical Context of Cybersecurity</title>
			<pubDate><![CDATA[Thu, 08 May 2025 11:39:45 +0000]]></pubDate>
		</item>
				</channel>
</rss>
