<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://datasys.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T01:19:51Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-1-build-your-datasys-mental-model-what-dbas-actually-do-daily</loc>
    <lastmod>2026-03-29T03:53:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-2-decode-ds0-001-exam-structure-question-types-scoring-and-rules</loc>
    <lastmod>2026-03-29T03:53:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-3-map-a-spoken-study-plan-how-to-win-with-audio-only-practice</loc>
    <lastmod>2026-03-29T03:53:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-4-compare-database-structure-types-relational-non-relational-and-nosql-families</loc>
    <lastmod>2026-03-29T03:54:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-5-navigate-nosql-types-confidently-document-key-value-column-and-graph-models</loc>
    <lastmod>2026-03-29T03:54:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-6-match-real-tools-to-use-cases-cassandra-mongodb-neo4j-dynamodb-cosmos</loc>
    <lastmod>2026-03-29T03:55:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-7-use-sql-ddl-with-precision-tables-constraints-keys-and-schema-changes</loc>
    <lastmod>2026-03-29T03:55:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-8-use-sql-dml-with-confidence-inserts-updates-deletes-and-safer-patterns</loc>
    <lastmod>2026-03-29T03:55:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-9-think-in-sets-for-performance-joins-aggregations-filters-and-ordering</loc>
    <lastmod>2026-03-29T03:56:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-10-control-transactions-deliberately-acid-isolation-levels-and-concurrency-choices</loc>
    <lastmod>2026-03-29T03:56:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-11-use-ansi-sql-intentionally-standards-portability-and-practical-tradeoffs</loc>
    <lastmod>2026-03-29T03:56:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-13-automate-with-triggers-wisely-enforcing-rules-without-creating-hidden-risk</loc>
    <lastmod>2026-03-29T03:58:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-14-compare-scripting-methods-and-environments-server-side-versus-client-side-execution</loc>
    <lastmod>2026-03-29T03:59:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-15-choose-operational-languages-powershell-and-python-for-database-administration</loc>
    <lastmod>2026-03-29T04:00:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-16-run-command-line-workflows-safely-linux-and-windows-scripting-patterns</loc>
    <lastmod>2026-03-29T04:00:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-17-understand-orm-behavior-how-mapping-layers-change-query-shape-and-risk</loc>
    <lastmod>2026-03-29T04:00:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-18-audit-orm-generated-sql-spotting-bad-plans-and-fixing-root-causes</loc>
    <lastmod>2026-03-29T04:01:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-19-gather-requirements-that-don-t-lie-users-storage-objectives-and-constraints</loc>
    <lastmod>2026-03-29T04:01:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-20-decide-cloud-or-on-premises-with-clarity-cost-control-and-operational-fit</loc>
    <lastmod>2026-03-29T04:01:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-21-decode-cloud-hosting-models-iaas-paas-and-saas-for-database-platforms</loc>
    <lastmod>2026-03-29T04:02:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-22-design-schemas-with-intent-logical-physical-and-view-level-perspectives</loc>
    <lastmod>2026-03-29T04:02:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-23-map-data-sources-and-specifications-inputs-interfaces-formats-and-assumptions</loc>
    <lastmod>2026-03-29T04:02:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-24-build-durable-documentation-data-dictionaries-er-diagrams-and-cardinality</loc>
    <lastmod>2026-03-29T04:03:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-25-prepare-deployment-assets-correctly-licensing-capacity-networking-and-access</loc>
    <lastmod>2026-03-29T04:03:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-26-execute-installation-phases-cleanly-provisioning-upgrades-imports-and-validation</loc>
    <lastmod>2026-03-29T04:03:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-27-establish-connectivity-correctly-server-location-dns-client-paths-and-routing</loc>
    <lastmod>2026-03-29T04:04:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-28-make-network-controls-work-firewalls-perimeter-networks-segmentation-and-ports</loc>
    <lastmod>2026-03-29T04:04:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-29-validate-database-structure-early-columns-tables-relationships-and-constraints</loc>
    <lastmod>2026-03-29T04:04:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-30-verify-code-execution-against-requirements-syntax-logic-and-error-handling</loc>
    <lastmod>2026-03-29T04:05:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-31-stress-test-real-workloads-stored-procedures-applications-and-peak-demand</loc>
    <lastmod>2026-03-29T04:05:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-32-configure-alerts-that-matter-thresholds-notifications-and-actionable-signals</loc>
    <lastmod>2026-03-29T04:05:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-33-control-change-without-drama-versioning-rollback-plans-and-regression-testing</loc>
    <lastmod>2026-03-29T04:06:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-34-validate-deployment-results-indexing-mapping-integrity-and-scalability-checks</loc>
    <lastmod>2026-03-29T04:06:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-35-monitor-what-keeps-databases-alive-baselines-throughput-latency-and-utilization</loc>
    <lastmod>2026-03-29T04:06:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-36-read-operational-evidence-logs-deadlocks-sessions-and-connection-failures</loc>
    <lastmod>2026-03-29T04:07:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-37-tune-queries-methodically-explain-plans-hot-paths-and-targeted-fixes</loc>
    <lastmod>2026-03-29T04:07:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-38-optimize-indexes-intelligently-selection-rebuilds-fragmentation-and-statistics</loc>
    <lastmod>2026-03-29T04:07:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-39-patch-without-breaking-things-updates-security-fixes-compatibility-and-rollback</loc>
    <lastmod>2026-03-29T04:07:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-40-prove-data-integrity-under-pressure-checks-locking-corruption-and-recovery-steps</loc>
    <lastmod>2026-03-29T04:07:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-41-manage-authentication-cleanly-accounts-roles-policies-and-strong-defaults</loc>
    <lastmod>2026-03-29T04:08:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-42-authorize-with-precision-privileges-least-privilege-and-separation-of-duties</loc>
    <lastmod>2026-03-29T04:09:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-43-protect-data-at-rest-and-in-transit-encryption-certificates-and-key-management</loc>
    <lastmod>2026-03-29T04:09:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-44-build-auditing-that-helps-logs-tamper-resistance-and-compliance-ready-evidence</loc>
    <lastmod>2026-03-29T04:09:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-45-harden-configuration-settings-defaults-surface-area-and-secure-operations</loc>
    <lastmod>2026-03-29T04:10:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-46-control-data-lifecycle-retention-archiving-purging-and-legal-holds</loc>
    <lastmod>2026-03-29T04:10:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-47-design-backups-that-restore-full-incremental-logs-and-verification-practices</loc>
    <lastmod>2026-03-29T04:10:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-48-execute-recovery-correctly-rto-rpo-point-in-time-and-runbook-discipline</loc>
    <lastmod>2026-03-29T04:11:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-49-build-high-availability-the-right-way-clustering-replication-and-failover-patterns</loc>
    <lastmod>2026-03-29T04:11:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-50-plan-disaster-recovery-end-to-end-sites-replication-distance-and-business-continuity</loc>
    <lastmod>2026-03-29T04:11:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-51-apply-data-masking-with-purpose-discovery-exposure-reduction-and-safer-testing</loc>
    <lastmod>2026-03-29T04:12:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-52-destroy-data-correctly-sanitization-methods-verification-and-chain-of-custody</loc>
    <lastmod>2026-03-29T04:12:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-53-audit-for-security-drift-expired-accounts-privilege-creep-and-risk-signals</loc>
    <lastmod>2026-03-29T04:12:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-54-perform-secure-code-reviews-sql-safety-secrets-handling-and-credential-storage</loc>
    <lastmod>2026-03-29T04:13:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-55-make-governance-practical-dlp-retention-policy-enforcement-and-real-oversight</loc>
    <lastmod>2026-03-29T04:14:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-56-classify-data-that-matters-pii-phi-sensitivity-levels-and-handling-rules</loc>
    <lastmod>2026-03-29T04:14:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-57-understand-compliance-drivers-pci-dss-gdpr-and-common-regional-requirements</loc>
    <lastmod>2026-03-29T04:15:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-58-build-access-controls-that-stick-rights-privileges-roles-and-least-privilege</loc>
    <lastmod>2026-03-29T04:15:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-59-set-password-policies-that-work-strength-rotation-exceptions-and-monitoring</loc>
    <lastmod>2026-03-29T04:15:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-60-manage-service-accounts-safely-ownership-rotation-scope-and-alerting</loc>
    <lastmod>2026-03-29T04:16:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/welcome-to-certified-the-comptia-datasys-audio-course</loc>
    <lastmod>2026-03-29T04:17:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-61-apply-iam-to-databases-authentication-authorization-federation-and-control-points</loc>
    <lastmod>2026-03-29T04:19:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-62-secure-infrastructure-physically-access-control-biometrics-surveillance-environment</loc>
    <lastmod>2026-03-29T04:19:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-63-secure-infrastructure-logically-network-controls-perimeters-segmentation-hardening</loc>
    <lastmod>2026-03-29T04:19:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-64-recognize-sql-injection-early-mechanics-impact-and-prevention-techniques</loc>
    <lastmod>2026-03-29T04:20:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-65-handle-dos-and-on-path-attacks-availability-trust-and-defensive-controls</loc>
    <lastmod>2026-03-29T04:21:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-66-resist-brute-force-and-phishing-credential-defense-and-access-hygiene</loc>
    <lastmod>2026-03-29T04:21:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-67-understand-malware-and-ransomware-impact-what-breaks-first-in-data-systems</loc>
    <lastmod>2026-03-29T04:22:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-68-design-disaster-recovery-that-works-roles-documentation-and-readiness-practices</loc>
    <lastmod>2026-03-29T04:22:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-69-choose-dr-techniques-intelligently-replication-log-shipping-ha-mirroring</loc>
    <lastmod>2026-03-29T04:22:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://datasys.baremetalcyber.com/episodes/episode-70-build-backups-that-restore-full-incremental-differential-testing-and-retention</loc>
    <lastmod>2026-03-29T04:23:23Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
