<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://shuronjit.com/</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://shuronjit.com/about-me.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/social-activity.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/videos.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/blogs.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentations.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/uploads/file-1643623496.pdf</loc>
  <lastmod>2022-01-31T10:04:55+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/gallery.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/contact.php</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/What-is-cyber-security-awareness-and-why-is-it-important?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Artificial-Intelligence-in-Healthcare:-Advantages-and-Challenges</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/What-is-API?-How-it-s-work-with-example?-Type-of-API-with-examples?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Information-Technology:-The-Backbone-of-Modern-Business</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/How-to-stop-Phishing-Attacks</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/How-to-remove-malware-from-Wordpress-website</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/How-PAM-works-in-banking-sector-by-using-Cyberark</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/What-is-Privileged-Access-Management-(PAM)-and-How-its-work?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Banking-Scam-over-the-phone-in-Australia</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1683116857</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1683116618</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1683116207</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1683116020</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1683115753</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1667649963</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1665307136</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1665306979</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Contact-us</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/DMCA-Copyright</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Disclaimer</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/About-Us</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Terms-&amp;-Conditions</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Privacy-Policy</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/ATM-Machine-&amp;-IT-Security:-Protecting-Your-Money</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Chatgpt:-A-Revolutionary-Chatbot-for-Personal-and-Business-Use</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Web-Penetration-testing-and-the-process-step-by-step</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Great-Unknown-knowledge-of-Computer-Software-</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/About-Android-App-and-Signs-of-a-hacked-Android-phone</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/About-Kali-Linux-and-its-features</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/What-do-you-mean-by-Android-TV-Device?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/The-Complete-Guide-to-Bug-Bounty-Programs</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/All-about-Capture-the-Flag</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Cryptocurrency-and-Is-it-legal-in-Australia?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Christmas-Through-the-Ages,-Origin,-Definition,-Traditions,-History,-&amp;-Facts</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Domain-and-Hosting:-9-things-you-need-to-know</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/10-Ways-to-Protect-Yourself-from-a-Cyber-Attack</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/8-Surprising-Things-You-Didn-t-Know-About-VirtualBox</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Get-to-Know-Kali-Linux:-The-Operating-System-for-Hackers</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/How-to-secure-a-website?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/10-Unknown-Things-About-Web-Applications</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/The-Top-Ten-Malware-Analysis-Tips-for-Cybersecurity-Professionals</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Career-Options-in-Cybersecurity-s-Many-Subfields </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/10-mysterious-things-about-cloud-security-that-you-never-knew</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/10-Things-You-Didn-t-Know-About-Firewalls-in-Cybersecurity</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Multiple-factor-authentication-system-implementation</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Most-Important-KPIs-for-Identity-and-Access-Management-(Benchmarks) </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Recommendations-for-Efficient-</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/The-Differences-Between-Black-Box,-White-Box,-and-Grey-Box-Attacks </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Types-of-threat-actors</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Ethical-Aspect-of-Ethical-Hacking</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/The-Ethical-Hacking-Methodology</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/5-of-the-Biggest-Cybersecurity-Risks-to-Online-Banks-and-How-to-Avoid-Them </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Compliance-with-the-Computer-Fraud-and-Abuse-Act-of-1986-(CFAA):-7-Top-Privacy-Tools-in-2022</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/To-further-protect-your-sensitive-information,-you-may-want-to-learn-more-about-password-salting- </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Why-You-Should-Take-Multi-Factor-Authentication-Seriously </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Multi-Factor-Authentication:-When-and-Why-You-Will-Use-It?</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/What-is-Cyber-Security???</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Definition-of-a-Cyber-Attack </loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/article/Understand-ethical-hacking</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=57</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=59</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=58</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=56</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=55</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=54</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=53</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=52</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1665306590</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/presentation/1664619182</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://shuronjit.com/download-article.php?id=51</loc>
  <lastmod>2023-06-25T12:01:17+00:00</lastmod>
  <priority>0.51</priority>
</url>


</urlset>