<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.appsecengineer.com</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/ai-llm-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/finance</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/government</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/healthcare</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/manufacturing</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/retail</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/technology</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/attacking-defending-containers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/aws-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/azure-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/blogs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/challenges</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/checkout</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/cloud-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/e-books/cloud-security-careers-guide</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/containers-kubernetes-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/courses</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/developers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/certifications</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/devsecops-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/e-books/beginners-guide-to-careers-in-appsec</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/e-books/train-your-teams-to-fly</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/easy-azure-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/easy-container-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/easy-devsecops-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/easy-gcp-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/easy-secure-code-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/easy-threat-modeling-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/labs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/gcp-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/learning-path-aws-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/order-confirmation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/pentester</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/pricing</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/search</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/secure-coding-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/security-architect</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/security-champion</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/security-engineers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/assessments</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/thank-you</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/thank-you-check-your-email</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/thank-you-for-reaching-out</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/e-books/the-ultimate-guide-to-building-security-champions</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/e-books/the-zero-trust-security-handbook</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/threat-modeling-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/welcome</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/customer-case-studies</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/events</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/ebooks</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/pricing</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/platform-overview</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/achieve-roi</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/achieve-compliance</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/increase-skills</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/reduce-risk</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/instructor-led-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/rapid-threat-modeling-with-genai-and-llms</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/devsecops-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/devsecops-masterclass-appsec-automation-edition</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/attacking-the-application-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/defending-the-application-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/agile-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/kubernetes-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/appsec-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/security-architecture-design-review-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/kubernetes-security-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/elastic-container-registry-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/purple-team-aws-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/attacking-defending-containers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/attacking-defending-aws-azure-and-gcp-cloud-apps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/threat-modeling-ilt-course</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/c-suite</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/scorm-lti</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/sso-scim</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-kodekloud</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-pluralsight</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-secure-code-warrior</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-secureflag</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-security-journey</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/learning-journeys</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/tournaments</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/reports</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-kodekloud</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-pluralsight</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-secure-code-warrior</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-secureflag</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-security-journey</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-veracode</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-veracode</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-cybrary</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-immersive-labs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-immersive-labs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/vs-blogs/appsecengineer-vs-cybrary</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/integrations</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/languages</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/thank-you-email-verified</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/thank-you-for-newsletter-subscription</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/partners</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/thank-you-become-a-partner</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/testimonials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/media-kit</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/secure-coding-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/ai-agent-security-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/appsecflag</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/updates-announcements</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/updates-announcements</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/devsecops-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/secure-coding-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/threat-modeling-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/aws-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/azure-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/containers-kubernetes-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/gcp-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/ai-llm-security-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/all-guides</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/nist</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/hipaa</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/dora</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/guest-blogging</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/guest-blogging</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/bootcamps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/bootcamps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/security-champions</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/vs-blogs/appsecengineer-vs-pluralsight-full-comparison</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/sub-processors</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/creatorstudio-2-0</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/secure-ai-coding-with-claude-code-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/enterprises/appsec-robots</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/secure-ai-coding-with-claude-code-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/individuals/appsec-robots</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/access-control-for-azure-storage</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/advanced-argocd-security-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/advanced-aws-vpc-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/advanced-network-security-controls</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/agile-threat-modelling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/amazon-detective-advanced-security-investigation-and-analysis</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/amazon-ecr-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/amazon-sqs-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/angular-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/api-attack-surface-service-account-token-exploitation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/api-security-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/applied-secure-code-review-context-reporting-simulators</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/argocd-secure-practices-and-monitoring</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attack-and-defense-ssrf-with-django</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-authentication-access-control</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-broken-obejct-level-authorization-in-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-broken-object-level-authorization-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-client-side-template-injection-in-vuejs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-command-injection-vulnerabilities-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-command-injection-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-containers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-cross-origin-resource-sharing-cors-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-cross-site-request-forgery-csrf-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-cryptographic-vulnerabilities-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-data-memory-poisoning-owasp-llm04-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-data-poisoning-owasp-llm08-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-dom-based-xss-in-nodejs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-dom-based-xss-in-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-excessive-agency</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-excessive-agency-owasp-llm06-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-improper-output-handling-owasp-llm05-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-insecure-deserialisation-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-insecure-deserialisation-with-java-ee-2</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-insecure-direct-object-reference-in-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-insecure-direct-object-references-idor-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-misinformation-owasp-llm09-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-nosql-injection-in-nodejs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-path-traversal-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-path-traversal-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-persistent-xss-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-primary-key-insecure-direct-object-references-pk-idor-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-prompt-injection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-prompt-injection-owasp-llm01-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-reflected-xss-in-nodejs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-reflected-xss-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-sensitive-information-disclosure-owasp-llm02-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-server-side-request-forgery-in-flask</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-server-side-request-forgery-ssrf-with-net</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-server-side-template-injection-with-rust-and-rocket-framework</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-sql-injection-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-sql-injection-with-java-spring-boot</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-sql-injection-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-ssrf</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-ssrf-server-side-request-forgery-with-rust-and-rocket-framework</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-ssrf-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-ssrf-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-supply-chain-attacks-owasp-llm03-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-system-prompt-leakage-owasp-llm07-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-template-injection-vulnerabilities-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-unbounded-consumption-owasp-llm10-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-xml-external-entity-xxe-vulnerabilities-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-xxe-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-defending-yaml-deserialization-vulnerabilities-with-typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-securing-container-registry</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-and-securing-gcp-compute-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-aws-serverless-applications</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/attacking-kubernetes-clusters-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/auditing-aws-environments</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-cognito-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-ec2-and-network-security-basics</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-iam-access-analyzer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-iam-analysis-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-lambda-vulnerability-assessment-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-s3-security-measures</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/aws-security-hub-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/azure-functions-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/azure-networking-and-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/azure-sentinel-a-comprehensive-guide-to-cloud-native-siem</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/breaking-and-defending-azure-storage</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/cloudfront-security-attack-and-defense-from-edge-to-origin</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/cognito-as-an-idp-and-authz-server</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/container-security-101</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/container-supply-chain-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/containers-beyond-docker</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/cross-origin-resource-sharing-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/cross-site-scripting-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/dast-automation-with-owasp-zap</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/devsecops-with-azure-devops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/devsecops-with-gaia</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/devsecops-with-gitlab-ci</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/essential-aws-api-gateway-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/essential-aws-security-monitoring</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/essentials-of-container-monitoring</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/git-101</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/github-actions-for-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/golang-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/google-cloud-iam-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/google-cloud-logging-and-monitoring-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/google-cloud-network-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/google-cloud-storage-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/graphql-attack-vectors</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/helm-chart-security-practices</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/helm-security-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/implementing-csrf-cross-site-request-forgery-with-java-ee</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/injections-xxe-and-insecure-deserialization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/intro-to-kubernetes-secrets</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-aws-iam</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-aws-s3</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-azure</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-azure-iam</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-dynamic-application-security-testing-dast-for-developers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-genai-and-large-language-models</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-genai-llm-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-istio</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-openapi-specification</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-static-application-security-testing-sast-for-developers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/introduction-to-web-app-cryptography</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/istio-authorization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/istio-mtls</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/java-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/jenkins-integration</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/jenkins-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/jwt-jiu-jitsu</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/kotlin-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/kubernetes-101</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/kubernetes-admission-control</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/kubernetes-authentication-and-authorization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/kubernetes-network-security-and-service-mesh-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/kubernetes-policy-management-with-kyverno</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mastering-argocd-kubernetes-deployment-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mastering-istio-traffic-management</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp01-2025---attacking-and-defending-token-mismanagement-secret-exposure</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp02-2025---attacking-and-defending-privilege-escalation-via-scope-creep</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp03-2025---attacking-and-defending-tool-poisoning</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp04-2025---attacking-and-defending-software-supply-chain-attacks-dependency-tampering</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp05-2025---attacking-and-defending-command-injection-execution</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp06-2025---attacking-and-defending-intent-flow-subversion</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp07-2025---attacking-and-defending-insufficient-authentication-authorization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp08-2025---attacking-and-defending-lack-of-audit-and-telemetry</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp09-2025---attacking-and-defending-shadow-mcp-servers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mcp10-2025---attacking-and-defending-context-injection-over-sharing</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/memory-corruption-attack-and-defense-in-c-programs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/model-context-protocol-tool-poisoning-attack-detection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/model-context-protocol-tool-shadowing-attack-detection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mongodb-security-authorization-privilege-enforcement</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mongodb-security-encryption-at-rest</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/multi-language-manual-code-review-for-owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/mysql-access-control-and-user-management</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/network-security-controls-in-azure</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/nodejs-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/oauth-and-oidc-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/osv-scanner-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/practical-azure-key-vault</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/practical-secure-code-review-taint-triage-simulators</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/python-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/reactjs-cross-site-scripting-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/reactjs-csp-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/recon-content-discovery-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/recon-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/recon-javascript-inspection-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/recon-subdomain-enumeration-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/ruby-on-rails-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/safe-deployment-strategies</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/saml-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/sast-with-jenkins</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/sca-with-jenkins</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/secret-management-in-argocd</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/secrets-in-aws</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/secrets-management-with-hashicorp-vault</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/secure-and-insecure-logging-with-scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/secure-store-ship-a-practical-guide-to-azure-container-registry</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/securing-mysql-connections-with-ssl-tls</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/securing-network-access-to-azure-virtual-machines</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/security-logging-for-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/semantic-input-validation-using-llms</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/smart-contract-security---attacking-and-defending-arbitrary-call-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/smart-contract-security---attacking-and-defending-governance-snapshot-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/smart-contract-security---oracle-key-leak-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/smart-contract-security---oracle-manipulation-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/smart-contract-security---reward-snipping-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/smart-contract-security---state-inconsistency-attack-and-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/source-composition-analysis-for-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/static-analysis-and-code-review-for-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/supply-chain-security-sboms-with-amazon-inspector</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/swift-security-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/terraform-101</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/threat-modeling-with-microsoft-threat-modeling-tool</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/threat-modelling-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/tls-and-encrypting-data-in-transit</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/vuejs-content-security-policy-playground</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/courses-collection/web-application-firewalls</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/30-minutes-to-think-like-an-attacker</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/ai-agents-security-the-good-the-bad-and-the-ugly</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/blackhat-usa-2026-ai-agent-security-masterclass-2026-edition</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/blackhat-usa-2026-appsec-robots-building-real-world-agents-for-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/blackhat-usa-2026-aws-azure-gcp-security-incident-response-forensics-masterclass</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/blackhat-usa-2026-certified-ai-security-champion</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/blackhat-usa-2026-devsecops-masterclass-appsec-automation-edition</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/danger-in-the-dependencies-surviving-supply-chain-attacks</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/everaging-semgrep-and-static-analysis-for-paved-roads-and-secure-defaults</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/from-file-upload-to-cluster-compromise</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/inside-the-mind-of-an-ai-attacker</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/llm-secure-coding---the-unexplored-frontier</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/role-based-it-security-training-can-it-suck-less</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/the-sboms-dont-lie-analyzing-dependencies-in-vulnerable-apps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/threat-modeling-for-developers-who-hate-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/webinar---industrialization-of-threat-modeling-with-genai</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/webinar-rapid-threat-modeling-with-genai-and-llmswebinar-</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/webinar-secure-by-design---across-the-stack</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/webinar-security-training-for-healthcare---hipaa-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/workshop/workshop-system-and-agile-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/10-cryptography-mistakes-youre-probably-making</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/11-things-to-look-for-in-an-infosec-training-platform</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/2021-guide-api-security-what-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/3-high-stakes-security-decisions-you-cant-ignore-in-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/4-essential-security-controls-for-container-registries</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/4-query-tools-that-every-developer-should-know</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/4-unconventional-ways-to-level-up-your-cloud-security-career-right-now</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/41-thought-leaders-in-infosec-to-watch-in-2024</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-critical-mcp-vulnerabilities-every-security-team-should-know</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-hands-on-security-training-platforms-that-wont-make-you-wait-for-blackhat</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-mistakes-to-avoid-in-your-security-awareness-training-program</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-myths-in-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-reasons-ai-agents-are-a-blind-spot-in-your-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-step-guide-to-beating-the-appsec-skills-gap</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/5-supply-chain-security-controls-that-every-business-should-know-about</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/7-things-you-can-do-to-actually-train-your-team</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/8-spooky-aws-security-mistakes-you-should-avoid-this-halloween</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/8-ways-to-fast-track-your-appsec-career</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/9-product-security-leaders-you-should-be-following-already</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/a-beginners-guide-to-bug-bounty-hunting</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/a-beginners-guide-to-cloud-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/a-guide-to-nist-sp-800-53-20-steps-to-compliance</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/a-post-pandemic-guide-to-build-application-security-teams</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/accelerating-software-delivery-with-git-in-devops-and-ci-cd-pipelines</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/access-control-for-azure-storage-a-comprehensive-guide</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/access-control-through-observability</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/adding-sec-to-devops-the-security-training-your-team-needs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/advanced-secrets-management-in-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ai-agents-in-appsec-are-coming-for-your-manual-reviews</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ai-generated-code-needs-its-own-secure-coding-guidelines</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ai-in-the-world-of-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ai-suggested-it-should-you-ship-it</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/all-about-cloud-related-compliance-and-how-to-abide-by-them</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/all-about-google-cloud-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/all-that-you-must-know-about-software-bill-of-materials-or-sbom</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/an-in-depth-look-at-secure-by-design-strategies</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/application-security-and-types</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/application-security-crisis-training-number-one-priority</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/application-security-engineer-interview-questions</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/appsec-automation-is-built-around-integration-context-and-ownership</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/appsec-intent-fails-without-developer-buy-in</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/appsecengineer-aws-security-learning-roadmap</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/appsecengineer-podcast-with-steve-springett</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/aws-api-gateway-custom-jwt-authorizers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/aws-api-gateway-rate-limiting</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/aws-security-basics-iam-users-vs-roles-vs-groups</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/aws-shared-responsibility-model-capital-one-breach-case-study</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/be-recession-proof</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/best-cybersecurity-black-friday-deals-for-2022</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/best-cybersecurity-black-friday-deals-for-2023</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/bigquery-vector-search-for-log-analysis-a-security-researchers-perspective</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/botnet-schools</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/breaking-and-defending-automation-the-appsec-perspective</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/breaking-bad-the-business-logic-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/bridging-the-cybersecurity-talent-gap-equipping-smbs-for-digital-defense</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/building-a-strong-devsecops-culture-in-a-hybrid-and-multi-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/building-secure-multi-agent-ai-architectures-for-enterprise-secops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/building-the-future-of-apis-with-openapi-best-practices-tools-and-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/business-growth-through-comprehensive-product-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/chatgpt-prompts-for-cybersecurity-marketers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/cloud-security-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/cloud-security-rockstars-on-linkedin</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/continuous-application-security-the-intersection-of-security-and-devops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/creatorstudio-2-0-and-the-end-of-static-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/dast-with-jenkins-scan-reporting-with-owasp-zap</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/data-privacy-week-best-practices-for-remote-workers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/deep-dive-into-pci-dss-achieve-compliance-in-12-steps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/defending-against-memory-corruption-attacks-in-c-based-applications</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/defending-kubernetes-clusters-against-container-escape-attacks</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/defense-in-depth-is-a-lie</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/demystifying-host-header-attacks-understanding-exploitation-resilient-defenses</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/developer-security-at-universities</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/developer-security-training-a-roadmap</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/devsecops-best-practices</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/devsecops-for-legacy-systems-and-monolithic-applications</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/devsecops-workflow-with-github-actions</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ditch-the-audit-panic-appsecengineers-got-your-back</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/dockers-heres-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/encrypting-your-encryption-key-storing-secrets-securely-in-aws</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/enhance-your-application-infrastructure-with-google-clouds-load-balancer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/every-ciso-needs-to-rethink-about-appsec-in-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/exploring-the-top-50-information-security-podcast-with-appsecengineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/exposed-secrets-and-broken-clouds-the-hidden-attack-surface-of-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/future-proofing-the-manufacturing-industry-with-appsecengineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/gaia-the-ultimate-devsecops-powerhouse-streamlining-security-in-modern-software-development</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/gcp-security-checklist-for-2023-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/github-actions-devsecops-strengthening-security-through-automation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/google-cloud-security-tips-1-iam-recommender</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/google-cloud-security-tips-2-identity-aware-proxy</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/google-cloud-security-tips-3-service-account-impersonation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/google-cloud-security-tips-4-workload-identity-federation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/google-cloud-security-tips-5-security-information-event-management</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/guide-to-becoming-an-application-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/hackedu-vs-appsecengineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/hands-on-defense-tactics-for-generative-ai-in-business</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/hardening-genai-starts-with-how-you-build-around-it</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/heres-why-we-use-jwts-json-web-tokens</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/hiring-vs-training-whats-better-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-ai-coding-assistants-are-redefining-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-amazon-cloudfront-enhances-streaming-performance-and-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-appsecengineer-helps-in-building-a-secure-coding-program-for-dev-teams</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-do-i-learn-container-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-do-you-level-up-dast-scans-on-your-rest-apis</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-do-you-monitor-an-aws-vpc</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-do-you-monitor-an-aws-vpc-2</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-docker-revolutionized-container-based-implementations</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-hackers-exploited-redacted-in-a-multi-cloud-security-breach</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-healthcare-mobile-apps-expose-patient-data</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-healthcare-teams-build-secure-by-design-software</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-is-threat-hunting-different-from-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-missing-authorization-led-to-unauthorized-access-and-exposed-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-the-fbi-was-hacked</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-become-cloud-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-build-a-devsecops-pipeline-in-jenkins</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-build-a-security-champions-program-that-actually-works</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-build-a-stronger-more-secure-software-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-build-compliance-training-developers-actually-use</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-build-software-fast-without-compromising-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-convince-your-manager-to-pay-for-a-security-bootcamp</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-create-a-central-logging-solution-in-aws-security-engineer-interview-questions</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-create-a-secure-code-training-plan-for-your-product-team-2</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-design-guardrails-for-secure-and-scalable-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-develop-software-thats-secure-by-design-7-steps-to-follow</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-do-secure-coding-5-best-practices-you-should-never-forget</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-do-source-code-review-of-legacy-codebases</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-earn-a-free-appsecengineer-subscription</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-evaluate-ai-generated-code-for-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-gamify-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-get-blackhat-skills-without-the-blackhat-budget</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-kubernetes-authorization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-make-secure-code-training-actually-work</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-make-secure-coding-a-core-engineering-capability-in-cloud-native</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-measure-the-success-of-your-security-champions-program</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-prevent-recurring-vulnerabilities-with-structured-learning-paths</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-protect-healthcare-data-in-a-multi-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-protect-your-organization-from-ai-threats-using-role-based-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-scale-security-decisions-across-hundreds-of-engineers-the-devsecops-4-stage-model</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-secure-ai-agents-without-slowing-down-your-teams</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-secure-web3-before-it-becomes-a-financial-liability</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-spend-your-year-end-budget-with-a-bang</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-strengthen-your-security-program-with-offensive-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-successfully-implement-shift-left-security-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-train-developers-to-secure-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-train-for-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-to-turn-secure-coding-into-a-contextual-engineering-capability</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/how-your-ai-pipeline-is-exposing-data-without-you-noticing</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/investing-in-security-awareness-unlocking-cost-savings-strengthening-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/is-chatgpt-the-next-big-thing-in-appsec</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/is-devsecops-a-good-career-option</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/is-hands-on-learning-actually-better</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/keeping-up-with-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/key-vulnerabilities-in-applications-and-how-to-secure-them</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/kubernetes-policy-management-with-kyverno</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/kubernetes-static-analysis-smackdown</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/largest-government-sponsored-enterprises-security-transformation-in-collaboration-with-appsecengineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/last-week-in-appsec-23-29-aug-2021</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/lazarus-groups-operation-dream-job-a-cyber-espionage-masterpiece</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/looking-back-at-the-2021-owasp-top-10-to-tackle-modern-security-threats</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/managing-user-authentication-and-access-control-with-aws-cognito</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/manual-vs-automated-reconnaissance</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/maximizing-performance-and-security-with-graphql-a-developers-perspective</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/multi-cloud-security-the-good-the-bad-and-the-ugly</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/must-follow-cybersecurity-stars-on-twitter</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/navigating-the-path-of-cybersecurity-risk-reduction-for-lasting-success</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ninja-level-security-with-unit-testing-and-tdd</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/not-interested-in-an-appsec-job-learning-security-can-still-boost-your-career</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/not-your-typical-guide-to-becoming-a-cloud-security-architect</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/nuclei-automation-deep-dive-into-templates-devsecops-workflows</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/one-week-after-the-crowdstrike-incident</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/our-voice-assisted-feature-will-change-the-way-you-learn</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/owasp-a10-2025-the-art-of-failing-securely-and-handling-exceptional-conditions</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/paris-call-for-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/pass-cmmc-audits-with-role-based-security-training-that-produces-verifiable-proof</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/pixelated-secrets-from-thumbnail-previews-to-aws-credentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/policy-as-code-a-tale-of-taming-aws-security-chaos</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/prepare-for-a-post-pandemic-career-in-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/protecting-patient-data-after-the-hca-data-breach</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/protecting-retail-operations-the-imperative-of-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/purple-teaming-and-ethical-hacking-the-role-of-a-pentester-in-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/quantum-safe-cryptography-standards-forging-an-unbreakable-digital-fortress</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ranking-3-best-and-worst-cybersecurity-scenes-hollywood</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/ransomware-strikes-the-las-vegas-strip-the-mgm-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/rest-api-security-understanding-threats-with-appsecengineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/safeguarding-against-ssrf-securing-html-to-pdf-conversion</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/safeguarding-healthcare-the-vital-role-of-cybersecurity-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/scaling-appsec-training-with-one-of-the-global-leader-in-the-energy-industry</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/scan-your-aws-lambda-with-amazon-inspector</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/secrets-in-the-cloud-how-two-companies-made-the-same-mistake</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/secure-coding-that-actually-reduces-risk-in-production</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/secure-coding-train-your-developers-now-or-never</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/securing-ai-ml-workloads-in-kubernetes-practical-strategies-for-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/securing-the-ai-llm-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/security-architecture-security-at-every-stage-of-sdlc</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/security-engineer-training-for-beginner</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/security-logging-is-an-underrated-superpower-for-web-applications</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/semgrep-the-easiest-sast-tool-for-developers-and-everyone-else</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/shift-left-isnt-dead</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/shifting-left-on-iac-security-the-executive-playbook-for-cloud-native-organizations</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/should-i-learn-to-code-for-a-infosec-career</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/smart-contract-security-training-for-engineering-teams</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/smart-threats-demand-smarter-cloud-defenses-powered-by-ai</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/start-your-security-champion-program-before-its-too-late</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/starting-devsecops-heres-4-tips-every-team-leader-should-know</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/stop-security-team-burnout-before-it-starts</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/strengthening-application-security-and-data-integrity-with-input-validation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/strengthening-cybersecurity-in-software-companies-the-vital-role-of-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/strengthening-cybersecurity-in-the-finance-industry-the-importance-of-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/strengthening-cybersecurity-in-the-us-government-the-critical-role-of-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/students-learning-to-code-need-to-have-this-skill-in-2022</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/super-app-takes-appsec-training-to-the-next-level</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/technology-to-make-compliance-easier-and-more-efficient</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/testing-with-nuclei-templates-make-your-dast-scans-10x-more-accurate</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-2025-cybersecurity-and-compliance-playbook</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-23andme-breach-and-your-online-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-absolute-need-for-appsec-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-ai-advantage-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-ai-advantage-in-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-art-of-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-best-infosec-training-platforms-in-2023</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-biggest-cyber-attacks-in-the-last-20-years</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-blackhat-training-survival-guide</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-business-case-for-developer-security-training-and-why-you-need-it-now</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-complete-guide-to-iso-27001-compliance</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-cybersecurity-professionals-guide-to-kernel-exploits</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-dna-of-high-performing-cybersecurity-teams</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-end-of-owasp-top-10-training-and-what-top-security-teams-do-instead</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-guide-for-effective-cloud-security-management-you-didnt-know-you-need</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-hard-truth-about-code-hardening-in-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-hidden-threat-mitigating-broken-function-level-authorization-for-strong-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-hilarious-journey-into-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-human-error-factor-in-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-impact-and-importance-of-secure-coding-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-importance-of-security-logging-in-protecting-your-web-apps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-kernel-as-your-first-responder-ebpfs-rise-in-autonomous-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-key-principles-of-cyber-resilience-for-building-a-secure-future</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-need-for-resilience-adaptability-and-proactive-security-measures--the-need-for-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-no-nonsense-guide-to-securing-your-e-commerce-business-today</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-only-guide-youll-need-to-build-your-own-devsecops-trained-team</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-rise-of-ai-driven-threat-modeling-for-developers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-rocky-path-to-effective-threat-modeling-automation</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-role-of-developer-security-training-in-pci-dss-4-0-compliance</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-role-of-fuzz-testing-in-software-security-part-1</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-security-metrics-that-actually-get-engineering-buy-in</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-top-cloud-security-roles-you-cant-afford-to-ignore</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/the-ultimate-guide-to-api-security-in-2024</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/these-4-security-skills-are-in-huge-demand-in-2023</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/thinking-about-a-career-in-tech-devops-vs-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/threat-modeling-as-a-critical-business-skill</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-10-cybersecurity-power-players</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-3-platforms-for-security-awareness-training-in-2026</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-5-dast-scan-tools-for-security-testing</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-5-reasons-of-llm-security-failure</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-9-secure-coding-mistakes-developers-still-make-and-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-ai-security-threats-enterprises-must-prepare-for</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-cloud-security-training-challenges-for-large-fintechs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-cybersecurity-experts-raising-the-bar-for-security-in-2024</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/top-kubernetes-security-issues-and-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/trojanizing-docker-images</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/underrated-features-in-security-tools</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/understanding-prompt-injection-a-guide-to-ais-top-security-threat-llm01</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/understanding-soc-2-compliance-a-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/understanding-vulnerability-exploitability-exchange-vex</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/unveiling-dependency-confusion</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/unveiling-the-webs-achilles-heel-broken-object-level-authorization-bola</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/using-vpc-peering-and-cloud-nat-to-turbo-charge-your-cloud-apps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/vpcs-for-dummies</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/vulnerability-free-code-starts-with-defensive-programming</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-are-the-biggest-aws-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-are-the-top-10-aws-security-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-detection-engineering</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-insecure-deserialization</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-mass-assignment</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-oauth-with-pkce-and-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-purple-team-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-roles-anywhere-the-newest-feature-in-aws-iam</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-server-side-template-injection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-threat-modeling-how-do-you-learn-it</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-xml-external-entities</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/what-is-xml-external-entities-xxe</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/whats-new-in-appsecengineer-security-playgrounds</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/whats-new-in-the-2025-owasp-top-10-for-llms</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/whats-the-current-state-of-cloud-in-2023</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/where-cisos-actually-train-teams-to-secure-ai-systems</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/where-security-leaders-train-when-theyre-done-wasting-time</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/white-box-vs-black-box-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/who-needs-soc-2-compliance-and-why-does-it-matters</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-diagrams-are-no-longer-needed-for-effective-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-hipaa-training-isnt-enough-to-protect-healthcare-data-in-2025</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-less-is-more-for-high-impact-developer-education</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-most-product-teams-fail-at-threat-modeling-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-owasp-top-10-important-for-appsec-engineers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-pick-a-career-in-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-security-training-in-healthcare-fails-to-protect-ehrs</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-should-you-learn-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-static-analysis-fails-on-ai-generated-code</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-traditional-threat-modeling-no-longer-works-for-enterprises</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-upskill-during-recession</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/why-you-need-security-champions-on-your-team</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/your-cloud-adoption-will-fail-heres-why</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/your-ultimate-guide-to-multi-cloud-security-training-with-appsecengineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/blog/zero-trust-is-the-cost-of-doing-business-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/ai-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/cloud-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/cloud-security-professionals</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/developer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/devops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/devsecops-engineers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/pentester</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/platform-engineers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/qa-engineers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/security-architect</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/security-champion</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/security-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/security-leaders</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/solutions-architects-system-designers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/sre-engineers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/technical-leads-and-code-reviewers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/technical-product-managers</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/persona-collection/technical-product-managers-2</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/advanced-application-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/ai-llm-security-learning-path-and-collection</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/application-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/aws-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/azure-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/container-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/google-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-paths/threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/aarsh-chaurasia</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/abhay-bhargav</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/abhishek-p-dharani</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/agastya-reddy</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/amulya-miriam-hubert</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/aneesh-bhargav</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/aninda-nath</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/anushika-babu</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/beatrice-manuel</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/bharat-kishore</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/cristi-zot</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/debarshi-das</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/deepak-venkatesh</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/ganga-sumanth</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/geet-hiwarat</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/gopikanna</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/hari-raksha-k-malali</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/haricharana-s</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/jason-haddix</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/joshua-jebaraj</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/krishna-jaishwal</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/madhu-sudan-sathujoda</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/mayank-prajapat</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/overcaffeinated-appsec-warrior</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/rajan-kalwar</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/rajesh-kanumuru</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/sachin-pandey</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/srushti-vachhrajani</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/vignesh-p</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/contributor/vishnu-prasad-k</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/case-studies/a-new-era-of-appsec-training-for-energy-enterprises</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/case-studies/driving-business-growth-with-product-security-training</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/case-studies/from-zero-training-to-1-200-engineers-skilled-in-secure-development</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/case-studies/mortgage-enterprise-partners-with-appsecengineer-for-security</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/case-studies/next-level-appsec-training-for-leading-super-apps</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/case-studies/transforming-security-training-adoption-for-a-leading-digital-experience-platform</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/angular</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/asp-net</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/c</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/c-2</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/c-sharp</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/django</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/flask</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/go</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/java</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/java-springboot</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/kotlin</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/laravel</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/llms</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/node-js</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/php</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/python</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/react</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/ruby</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/ruby-on-rails</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/scala</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/spring</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/swift</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/symfony</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/typescript</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/languages/vue-js</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/an-introductory-journey-through-the-world-of-devsecops</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/aws-iam-essentials-journey</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/container-security-essentials-journey</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/hipaa-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/jenkins-security-journey</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/pci-dss-secure-coding</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/secure-by-design</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/security-champions-training---level-1</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/learning-journeys/security-code-reviewer-certification</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/bootcamps/appsecengineer-tm-certified-ai-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/bootcamps/appsecengineer-tm-certified-appsec-robots-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/bootcamps/appsecengineer-tm-certified-devsecops-engineer</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/bootcamps/certified-application-threat-modeler</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/bootcamps/certified-cloud-native-security-expert-bootcamp</loc>
    </url>
    <url>
        <loc>https://www.appsecengineer.com/bootcamps/certified-supply-chain-security-engineer</loc>
    </url>
</urlset>