<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/</loc><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2021/02/14-hacking-web-applications.jpg</image:loc><image:title>14- HACKING WEB APPLICATIONS</image:title><image:caption>14. LE PIRATAGE D'APPLICATIONS WEB</image:caption></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2021/02/13-hacking-web-servers.jpg</image:loc><image:title>13- HACKING WEB SERVERS</image:title><image:caption>13. LE PIRATAGE DE SERVEUR WEB</image:caption></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2021/02/12-evading-idsfirewall-honeypots.jpg</image:loc><image:title>12- EVADING IDS,FIREWALL &amp; HONEYPOTS</image:title><image:caption>12. EVASION AUX IDS, PARE-FEU ET POTS DE MIEL</image:caption></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2021/02/11-session-hijacking.jpg</image:loc><image:title>11- Session Hijacking</image:title><image:caption>11. LE DETOURNEMENT DE SESSION ( Hijacking )</image:caption></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/10/dos.jpg</image:loc><image:title>DoS</image:title><image:caption>10. ATTAQUE PAR DENI DE SERVICE</image:caption></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/09/ingenierie-sociale.jpg</image:loc><image:title>Ingénierie sociale</image:title><image:caption>9. L'INGENIERIE SOCIALE</image:caption></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/09/vulnerability-1.jpg</image:loc><image:title>vulnerability</image:title><image:caption>5. L'ANALYSE DE VULNÉRABILITÉ</image:caption></image:image><lastmod>2021-04-26T17:11:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/le-piratage-dobjets-iot/</loc><lastmod>2021-04-26T17:10:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/cloud-computing/</loc><lastmod>2021-04-26T17:09:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/linjection-sql/</loc><lastmod>2021-04-07T15:07:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/piratage-des-plateformes-mobiles/</loc><lastmod>2021-03-30T20:23:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/piratage-de-reseaux-sans-fil/</loc><lastmod>2021-03-30T20:19:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/evasion-aux-ids-pare-feu-et-pots-de-miel/</loc><lastmod>2021-03-30T20:08:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/piratage-dapplications-web/</loc><lastmod>2021-03-30T20:04:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/vpn-mfa/active-directory/</loc><lastmod>2021-02-10T14:24:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/vpn-mfa/cisco-ise/</loc><lastmod>2021-02-10T14:23:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/vpn-mfa/asa-vpn/</loc><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/17.png</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/16.png</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/15.png</image:loc><image:title>15</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/14.png</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/13.png</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/12.png</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/11.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/10.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/9.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2020/04/8.png</image:loc><image:title>8</image:title></image:image><lastmod>2021-02-10T14:22:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/authentification-de-fichiers/</loc><lastmod>2021-02-10T14:21:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/script-pour-la-verification-de-la-conformite-des-configurations/</loc><lastmod>2021-02-10T14:18:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/automatisation-de-backup-troubleshooting/</loc><lastmod>2021-02-10T14:16:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/script-de-configuration-de-routage-ospf/</loc><lastmod>2021-02-10T14:15:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/script-de-ping/</loc><lastmod>2021-02-10T14:14:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/librairie-de-connexion-par-ssh-sur-un-routeur/</loc><lastmod>2021-02-10T14:14:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/pour-commencer/</loc><lastmod>2021-02-10T14:13:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/generation-de-mots-de-passe/</loc><lastmod>2021-02-10T14:11:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/automatisation-de-configurations-des-routeurs/</loc><lastmod>2021-02-10T14:10:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/concepts-de-commutation/</loc><lastmod>2021-02-10T14:09:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/principes-fondamentaux-de-la-virtualisation/</loc><lastmod>2021-02-10T14:08:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/principes-des-reseaux-sans-fil/</loc><lastmod>2021-02-10T14:08:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/parametrages-ip-pour-se-windows-macos-linux/</loc><lastmod>2021-02-10T14:07:22+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/adressage-ipv6/</loc><lastmod>2021-02-10T14:06:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/adressage-ipv4/</loc><lastmod>2021-02-10T14:06:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/tcp-vs-udp/</loc><lastmod>2021-02-10T14:05:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/comparaison-des-types-de-cablage-et-dinterface-physique/</loc><lastmod>2021-02-10T14:05:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/les-architectures-reseau-description-des-caracteristiques/</loc><lastmod>2021-02-10T14:03:38+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/composants-reseau/</loc><lastmod>2021-02-10T14:03:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/vpn-mfa/</loc><lastmod>2021-02-10T14:01:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/principaux-concepts/</loc><lastmod>2021-02-10T14:00:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/</loc><lastmod>2021-02-10T13:59:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/attaque-par-deni-de-service/</loc><lastmod>2021-02-10T13:56:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/piratage-de-serveurs-web/</loc><lastmod>2021-02-10T13:55:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/les-menaces-des-malware-logiciels-malveillants/</loc><lastmod>2021-02-10T13:54:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/le-reniflement-de-paquets-sniffing/</loc><lastmod>2021-02-10T13:53:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/le-piratage-de-systeme/</loc><lastmod>2021-02-10T13:53:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/le-balayage-scanning/</loc><lastmod>2021-02-10T13:52:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/la-reconnaissance-footprinting/</loc><lastmod>2021-02-10T13:52:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/la-phase-denumeration/</loc><lastmod>2021-02-10T13:52:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/analyse-de-vulnerabilite/</loc><lastmod>2021-02-10T13:51:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/introduction-a-lethical-hacking/</loc><lastmod>2021-02-10T13:50:09+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/ingenierie-sociale/</loc><lastmod>2021-02-10T13:49:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/gestion-des-risques/</loc><lastmod>2021-02-10T13:48:24+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/vpn-mfa/duo-cloud/</loc><lastmod>2021-02-10T13:46:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/fondamentaux-de-la-securite/vpn-mfa/duo-authentication-proxy/</loc><lastmod>2021-02-10T13:46:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/cyber-securite-ethical-hacking/detournement-de-session-hijacking/</loc><lastmod>2021-02-10T13:44:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/les-fondamentaux/</loc><lastmod>2021-02-10T13:43:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/automatisation/</loc><lastmod>2021-02-10T13:36:46+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/acces-au-reseau/</loc><lastmod>2021-02-10T13:34:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/a-propos-de-nous/</loc><lastmod>2021-02-10T13:34:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/nous-contactez/</loc><lastmod>2021-02-10T13:33:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/reseaux/</loc><image:image><image:loc>https://techno-skills.com/wp-content/uploads/2021/02/rsx.jpg</image:loc><image:title>rsx</image:title></image:image><lastmod>2021-02-09T23:29:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/ethical-hacking/</loc><lastmod>2021-02-09T17:44:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/ccna-200-301/</loc><lastmod>2021-02-09T17:44:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/securite/</loc><lastmod>2021-02-09T17:28:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/blog-feed/</loc><lastmod>2020-05-19T18:50:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/connectivite-ip/</loc><lastmod>2020-05-04T20:59:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/services-lies-a-ip/</loc><lastmod>2020-05-04T20:58:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/service-2/</loc><lastmod>2020-05-01T21:10:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/service-1/</loc><lastmod>2020-05-01T21:08:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com/services/</loc><lastmod>2020-05-01T21:08:29+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techno-skills.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2021-04-26T17:11:54+00:00</lastmod></url></urlset>
