<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.majdak.online/automatyzacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/2025/02/20/kurswireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/aktualizacja-falcons-escape-czerwiec-2025</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/archive</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/authors</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/automatyzacja-pentestow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/black-hat-bash</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/black-hat-python</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/bomba-logiczna</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/bron-mikrofalowa-drony</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/cjadc2-link-16-leo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/cloudflare-tunnel-must-have</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/cors-cross-origin-resource-sharing-2026</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/cybersecurity-is-engineering-not-moralizing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/dekra-iso27001-cert</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/devsecops-github-advanced-security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/do%C5%82%C4%85czamy-do-issa-polska</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/drony-przekazniki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/esp32-Tarlogic</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/esp32Marauder-update</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/espressif-idf</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/grupy-ransomware-2025</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/http-evolution-2026</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/insecon-2025-relacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/INSECON-2026-Paula-Januszkiewicz</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/iso27001</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/iso27002</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/jak-zhakowac-wlasna-aplikacje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/jamming-reb</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/kali-linux-2026</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/krytyczna-luka-bezpieczenstwa-w-kamerach-lg</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/kurs-atuin</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/kurs-istqb</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/kurs-owasp-top10-2025</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/kurs-pihole</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/n8ndev-2025-07-25</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-04-24</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-04-25</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-04-27</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-04-29</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-07</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-09</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-12</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-13</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-14</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-16</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-17</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-19</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-21</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-23-a</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-23-b</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-24</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-05-31</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-07</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-08</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-09</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-11</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-12</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-15</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-16</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-17</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-18</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-19</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-21</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-22</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-23</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-24</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-26</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-06-30</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-06-sekurak-academy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-07-owasp-top10-ml</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-09</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-11</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-14</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-17</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-21</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-24</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-25</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-26</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-27</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-07-30</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-07</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-12</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-18</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-08-24</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-09-02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-09-07</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-09-08</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/news-2025-09-16</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/optymalizacja-seo-ai-2025-11-04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/osint-numer-telefonu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/10</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/11</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/12</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/4</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/5</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/6</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/7</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/8</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/page/9</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/pegasus-tracking-2025-11-15</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/podatno%C5%9B%C4%87-na-jamming-w-kamerach-xiaomi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/reads-open-source</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/security-engineer-przewodnik-2025</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/semantic-release-github-actions</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/sonarqube-2026-standard-polemika</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/sonarqube-2026-zero-trust</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/system-link-16</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/adblock</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ai-exploit</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ai-security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ai-seo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/aiact</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/analiza</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/android-hacking</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/answer-engine-optimization</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/arduino</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/artificial-intelligence</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/atak</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ataki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ataki/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ataki/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ataki/page/4</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ataki/page/5</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ataki/page/6</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/atuin</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/automation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/automation/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/backtrack</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/bash-scripting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/bezpieczenstwo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/bezpieczenstwo-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/black-hat-bash</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/black-hat-python</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/aiTools</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/brandAuthority</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/contentMarketing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/contentStrategy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/digitalPR</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/eEAT</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/featuredSnippets</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/multimodalSearch</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/openai</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/perplexity</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/schemaMarkup</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/searchAI</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/technicalSEO</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/blog/tags/voiceSearch</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/book-review</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/browser</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/bsp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/certification</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/certyfikaty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cgnat</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cicd</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/circuitpython</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cjadc2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cloudflare</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cloudflare-tunnel</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/communication</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cors</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cpp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/crlf</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cyber-incident</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cyber-threats</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cyberbezpieczenstwo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cyberbezpieczenstwo-wojskowe</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cyberbezpieczenstwo/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cyberbezpieczenstwo/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/4</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/5</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/6</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/7</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/8</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/cybersecurity/page/9</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/darmowy-ssl</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/data-breach</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/deepfake</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/devops</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/devsecops</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/dokumentacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/drony</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/embedded</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/esp-idf</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/esp32</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/esphome</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/exploits</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/exploits/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/exploits/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/exploits/page/4</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/exploits/page/5</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/exploits/page/6</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/extensions</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/facebook</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/falconsescape</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/fedora</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/flipperzero</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/game-dev</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/gen-ai</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/generative-ai</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/geo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ghas</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/git</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/github-actions</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/gps</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/grupy-hakerskie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/history</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/http</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/http2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/http3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ibcs</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/infosec</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/insecon</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/intelx</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ios-hacking</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/iot</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/iso27001</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/iso27002</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/issa-polska</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/istqb</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/it</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/jamming</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/kali-linux</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/konferencje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/kurs</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/leo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/link-16</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/link-22</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/linux</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/linux-2026</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/madl</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/malware</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/malware/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/malware/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/management</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/marauder</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/micropython</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/mids</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/miecznik</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/military</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ml-security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/modernizacja-wp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/multi-domain-operations</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/n8n</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/nato</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/nawigacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/networking</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ochrona-sieci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/offensive-security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/open-source-intel</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/opensource</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/optimization</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/osint</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/owasp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/owasp/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/patch-management</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/pentesting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/pentesting/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/phishing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/phoneinfoga</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/pihole</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/platformio</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/poradnik</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/port-scanning</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy/page/4</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy/page/5</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy/page/6</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/privacy/page/7</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/prompt-injection</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/przewodnik</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/pwsa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/python</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/quic</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ransomware</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/ransomware/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/raspberry-pi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/red-teaming</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/rustscan</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/samesite</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/secops</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/secure-ai</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/security-awareness</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/securityengineer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/semantic-release</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/siec</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/social-engineering</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/software-testing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/spolecznosc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/spoofing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/standardy-miedzynarodowe</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/tasmota</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/tech-risks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/technologie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/technologie/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/terminal</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/testing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/threat-intelligence</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/tls</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/tutorial</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/uav</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/vulnerabilities</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/vulnerabilities/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/web-security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/web-security/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/web-security/page/3</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/webapp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/webapp/page/2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/wojsko</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/wydarzenia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/xiaomi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/yubikey</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/zarzadzanie-bezpieczenstwem</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/zephyr-rtos</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/zero-day</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/tags/zero-trust</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/url-blocker</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/webapp-penetration-testing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/wojskowe-drony</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/yubikey-na-fedora</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/zaklocenia-gps-spoofing-jamming-2025</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/blog/zmodernizowane-shahed-136-nvidia-ai-crpa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/contact</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/markdown-page</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/wsparcie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-instalacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-podstawowe-funkcje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-podsumowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-problemy-debugowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-statystyki-personalizacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-synchronizacja-bezpieczenstwo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/atuin-kurs-wstep/atuin-kurs-wstep</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/01-wprowadzenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/01-wprowadzenie-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/02-analiza-stosu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/02-obowi%C4%85zki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/03-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/03-terminy-definicje-i-skr%C3%B3ty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/03-testowanie-podatno%C5%9Bci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/04-raport-bezpiecze%C5%84stwa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/04-struktura-dokumentu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/04-zgodnosc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/05-podsumowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/05-praktyki-i-rozw%C3%B3j</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/05-srodki-organizacyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/06-checklisty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/06-kontrola-personelu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/07-certyfikaty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/07-srodki-fizyczne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/08-przysz%C5%82o%C5%9B%C4%87</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/08-srodki-technologiczne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/75-udokumentowane-informacje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/92-audyt-wewn%C4%99trzny</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/analiza-przyk%C5%82adowych-scenariuszy-atak%C3%B3w-w-wireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/deanonimizacja-ruchu-sieciowego-i-wykrywanie-tunelowania-danych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/dokumentowanie-analizy-sieci-i-raportowanie-wynik%C3%B3w</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/doskonalenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/dzia%C5%82ania-operacyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/filtrowanie-ruchu-w-wireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/indywidualny-kurs-programowania-1-na-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/integracja-wiresharka-z-inymi-narz%C4%99dziami-do-monitorowania-i-testowania-bezpiecze%C5%84stwa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/interpretacja-danych-w-wireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kali-linux--testy-penetracyjne-aplikacji-webowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/konfiguracja-i-optymalizacja-wiresharka</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kontekst-organizacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kurs-atuin---making-your-shell-magical</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kurs-istqb---certified-tester-foundation-level-ctfl</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kurs-istqb---pytania-egzaminacyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kurs-pihole</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kurs-security-engineer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/kurs-wireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/najlepsze-praktyki-monitorowania-i-reagowania-na-incydenty-bezpiecze%C5%84stwa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/ocena-efekt%C3%B3w</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/owasp-top-10--testy-penetracyjne-aplikacji-webowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/planowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/podstawy-protoko%C5%82%C3%B3w-sieciowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/praktyczne-przypadki-u%C5%BCycia-wireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/przysz%C5%82o%C5%9B%C4%87-wiresharka-i-trendy-w-analizie-ruchu-sieciowego</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/przyw%C3%B3dztwo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/rekonstrukcja-strumieni-i-%C5%9Bledzenie-sesji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/wprowadzenie-do-wiresharka</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/wsparcie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/zaawansowane-techniki-wykrywania-atak%C3%B3w-w-wireshark</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/category/zapowied%C5%BA-kursu-zaawansowanego</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/intro</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/iso27001</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/iso27002</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/narzedzia-wspierajace-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/podstawy-testowania-czym-jest-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/podstawy-testowania-dlaczego-jest-konieczne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/podstawy-testowania-podstawowe-pojecia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/podstawy-testowania-proces-testowy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/podstawy-testowania-siedem-zasad-testowania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/podsumowanie-i-zapowiedz</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/pytania-egzzaminacyjne/narzedzia-wspierajace-testowanie-pytania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/pytania-egzzaminacyjne/podstawy-testowania-pytania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/pytania-egzzaminacyjne/statyczne-techniki-testowania-pytania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/pytania-egzzaminacyjne/techniki-projektowania-testow-pytania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/pytania-egzzaminacyjne/testowanie-w-cyklu-zycia-oprogramowania-pytania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/pytania-egzzaminacyjne/zarzadzanie-testowaniem-pytania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/statyczne-techniki-testowania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/techniki-projektowania-testow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/testowanie-w-cyklu-zycia-oprogramowania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/istqbfoundationlevel/zarzadzanie-testowaniem</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/2fa-bypass</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/active-recon</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/api-websockets-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/automatyzacja-eksploatacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/broken-authentication</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/case-studies-practice</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/cloud-testing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/cross-site-scripting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/idor-broken-access</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/injection-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/instalacja-kali-linux</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/metodologia-pentestow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/passive-recon</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/pentest-reports</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/pentest-summary</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/podstawowe-narzedzia-kali</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/real-world-exploit-analysis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/reverse-shell-post-exploitation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/security-misconfigurations</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/ssrf-rce</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-kali-linux/wstep-do-kursu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/analiza-stosu/identyfikacja-technologii</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/analiza-stosu/narzedzia-do-analizy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/analiza-stosu/znaczenie-stosu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/podsumowanie/dalsze-kroki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/podsumowanie/dobre-praktyki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/podsumowanie/wnioski</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/raport-bezpieczenstwa/analiza-wynikow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/raport-bezpieczenstwa/cwiczenie-raport</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/raport-bezpieczenstwa/narzedzia-do-raportow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/raport-bezpieczenstwa/rekomendacje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/raport-bezpieczenstwa/struktura-raportu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a01-broken-access-control-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a01-broken-access-control-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a01-broken-access-control-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a01-broken-access-control-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a01-broken-access-control-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a02-cryptographic-failures-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a02-cryptographic-failures-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a02-cryptographic-failures-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a02-cryptographic-failures-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a02-cryptographic-failures-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a03-injection-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a03-injection-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a03-injection-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a03-injection-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a03-injection-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a04-insecure-design-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a04-insecure-design-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a04-insecure-design-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a04-insecure-design-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a04-insecure-design-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a05-security-misconfiguration-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a05-security-misconfiguration-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a05-security-misconfiguration-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a05-security-misconfiguration-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a05-security-misconfiguration-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a06-vulnerable-components-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a06-vulnerable-components-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a06-vulnerable-components-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a06-vulnerable-components-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a06-vulnerable-components-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a07-authentication-failures-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a07-authentication-failures-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a07-authentication-failures-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a07-authentication-failures-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a07-authentication-failures-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a08-integrity-failures-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a08-integrity-failures-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a08-integrity-failures-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a08-integrity-failures-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a08-integrity-failures-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a09-logging-monitoring-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a09-logging-monitoring-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a09-logging-monitoring-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a09-logging-monitoring-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a09-logging-monitoring-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a10-ssrf-cwiczenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a10-ssrf-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a10-ssrf-narzedzia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a10-ssrf-opis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/testowanie-podatnosci/a10-ssrf-testowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/wprowadzenie/cel-i-znaczenie-testow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/wprowadzenie/omowienie-owasp-top-10-2025</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-owasp/wprowadzenie/struktura-kursu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurs-programowanie/wstep-do-kursu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/intro</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-1-przygotowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-2-instalacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-3-konfiguracja-sieci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-4-zarzadzanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-5-zabezpieczenia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-6-zaawansowane-funkcje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-7-rozwiazywanie-problemow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/rozdzial-8-scenariusze-zastosowania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurspihole/zalaczniki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/01/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/01/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/01/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/01/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/02/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/03/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/03/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/03/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/03/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/04/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/04/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/04/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/05/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/05/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/05/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/05/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/06/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/06/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/06/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/06/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/06/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/07/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/07/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/07/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/07/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/07/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/08/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/08/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/08/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/08/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/08/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/08/06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/09/07</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/10/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/10/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/10/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/10/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/10/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/10/06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/11/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/11/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/11/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/11/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/11/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/12/07</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/13/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/13/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/13/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/13/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/13/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/14/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/14/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/14/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/14/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/14/05</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/14/06</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/15/01</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/15/02</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/15/03</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/15/04</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/kurswireshark/wprowadzenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/bibliografia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/doskonalenie/ciagle-doskonalenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/doskonalenie/niezgodnosci-i-dzialania-korygujace</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/dzialania-operacyjne/ocena-ryzyka-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/dzialania-operacyjne/planowanie-i-nadzor-operacyjny</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/dzialania-operacyjne/postepowanie-z-ryzykiem-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/kontekst-organizacji/okreslenie-zakresu-systemu-zarzadzania-bezpieczenstwem-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/kontekst-organizacji/system-zarzadzania-bezpieczenstwem-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/kontekst-organizacji/zrozumienie-organizacji-i-jej-kontekstu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/kontekst-organizacji/zrozumienie-potrzeb-i-oczekiwan-zainteresowanych-stron</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/ocena-efektow/audyt-wewnetrzny/postanowienia-ogolne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/ocena-efektow/audyt-wewnetrzny/program-audytow-wewnetrznych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/ocena-efektow/monitorowanie-pomiary-analiza-i-ocena</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/ocena-efektow/przeglad-zarzadzania/dane-wejsciowe-do-przegladu-zarzadzania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/ocena-efektow/przeglad-zarzadzania/postanowienia-ogolne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/ocena-efektow/przeglad-zarzadzania/wyniki-przegladu-zarzadzania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/odniesienia-normatywne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/planowanie/cele-bezpieczenstwa-informacji-i-planowanie-ich-osiagniecia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/planowanie/ocena-ryzyka-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/planowanie/postanowienia-ogolne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/planowanie/postepowanie-z-ryzykiem-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/przedmowa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/przywodztwo/polityka</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/przywodztwo/przywodztwo-i-zaangazowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/przywodztwo/role-organizacyjne-odpowiedzialnosci-i-uprawnienia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/terminy-i-definicje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wprowadzenie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/kompetencje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/komunikacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/swiadomosc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/udokumentowane-informacje/nadzorowanie-udokumentowanych-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/udokumentowane-informacje/postanowienia-ogolne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/udokumentowane-informacje/tworzenie-i-aktualizacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wsparcie/zasoby</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wykaz-zabezpieczen/odniesienie-do-zabezpieczen</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wykaz-zabezpieczen/srodki-fizyczne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wykaz-zabezpieczen/srodki-technologiczne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/wykaz-zabezpieczen/zarzadzanie-personelem</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27001/zakres</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/aneks-a</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/aneks-b</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/bazy-danych-podatnosci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/bibliografia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/odniesienia-normatywne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.1-fizyczne-granice-bezpieczenstwa</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.10-nosniki-danych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.11-infrastruktura-wspomagajaca</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.12-ochrona-kabli</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.13-konserwacja-sprzetu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.14-bezpieczna-utylizacja-i-ponowne-uzycie-sprzetu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.2-dostep-fizyczny</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.3-zabezpieczenie-biur-pomieszczen-i-obiektow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.4-monitorowanie-fizyczne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.5-ochrona-przed-zagrozeniami-fizycznymi-i-srodowiskowymi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.6-praca-w-strefach-bezpiecznych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.7-zasady-czystego-biurka-i-ekranu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.8-lokalizacja-i-ochrona-sprzetu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-fizyczne/7.9-bezpieczenstwo-aktywow-poza-siedziba</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.1-polityka-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.10-akceptowalne-uzycie-zasobow-informacyjnych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.11-zwrot-zasobow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.12-klasyfikacja-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.13-oznaczanie-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.14-transfer-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.15-kontrola-dostepu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.16-zarzadzanie-tozsamoscia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.17-informacje-uwierzytelniajace</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.18-prawa-dostepu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.19-bezpieczenstwo-informacji-w-relacjach-z-dostawcami</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.2-role-i-odpowiedzialnosci-w-zakresie-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.20-uwzglednianie-bezpieczenstwa-w-umowach-z-dostawcami</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.21-zarzadzanie-bezpieczenstwem-informacji-w-lancuchu-dostaw-it</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.22-monitorowanie-i-zmiany-w-uslugach-dostawcow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.23-bezpieczenstwo-informacji-w-uslugach-chmurowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.24-planowanie-zarzadzania-incydentami-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.25-ocena-i-decyzje-dotyczace-zdarzen-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.26-reakcja-na-incydenty-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.27-wnioski-wyciagane-z-incydentow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.28-zbieranie-dowodow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.29-bezpieczenstwo-informacji-w-czasie-zaklocen-dzialalnosci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.3-segregacja-obowiazkow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.30-gotowosc-it-do-ciaglosci-dzialania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.31-wymagania-prawne-i-regulacyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.32-ochrona-wlasnosci-intelektualnej</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.33-ochrona-zapisow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.34-prywatnosc-i-ochrona-danych-osobowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.35-niezalezny-przeglad-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.36-zgodnosc-z-politykami-zasadami-i-standardami-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.37-udokumentowane-procedury-operacyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.4-odpowiedzialnosc-zarzadu</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.5-kontakt-z-organami-regulacyjnymi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.6-kontakt-z-grupami-interesariuszy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.7-wywiad-zagrozen</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.8-bezpieczenstwo-informacji-w-zarzadzaniu-projektami</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-organizacyjne/5.9-inwentaryzacja-aktywow-informacyjnych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.1-weryfikacja-kandydatow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.2-warunki-zatrudnienia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.3-swiadomosc-edukacja-i-szkolenia-z-zakresu-bezpieczenstwa-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.4-proces-dyscyplinarny</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.5-odpowiedzialnosc-po-zakonczeniu-zatrudnienia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.6-umowy-o-poufnosci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.7-praca-zdalna</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-personelu/6.8-raportowanie-zdarzen-zwiazanych-z-bezpieczenstwem-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.1-urzadzenia-uzytkownika-koncowego</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.10-usuwanie-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.11-maskowanie-danych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.12-zapobieganie-wyciekom-danych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.13-kopie-zapasowe-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.14-redundancja-systemow-przetwarzania-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.15-rejestrowanie-zdarzen</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.16-monitorowanie-aktywnosci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.17-synchronizacja-zegara</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.18-uzycie-uprzywilejowanych-programow-narzedziowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.19-instalacja-oprogramowania-w-systemach-operacyjnych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.2-prawa-dostepu-uprzywilejowanego</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.20-bezpieczenstwo-sieci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.21-bezpieczenstwo-uslug-sieciowych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.22-segregacja-sieci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.23-filtrowanie-sieciowe</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.24-zastosowanie-kryptografii</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.25-bezpieczny-cykl-zycia-oprogramowania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.26-wymagania-bezpieczenstwa-aplikacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.27-bezpieczna-architektura-systemu-i-zasady-inzynierii</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.28-bezpieczne-programowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.29-testowanie-bezpieczenstwa-w-cyklu-rozwoju</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.3-ograniczenie-dostepu-do-informacji</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.30-outsourcing-rozwoju</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.31-separacja-srodowisk-deweloperskich-testowych-i-produkcyjnych</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.32-zarzadzanie-zmianami</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.33-informacje-testowe</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.34-ochrona-systemow-informatycznych-podczas-audytow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.4-dostep-do-kodu-zrodlowego</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.5-bezpieczne-uwierzytelnianie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.6-zarzadzanie-pojemnoscia</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.7-ochrona-przed-zlosliwym-oprogramowaniem</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.8-zarzadzanie-podatnosciami-technicznymi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/srodki-technologiczne/8.9-zarzadzanie-konfiguracja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/struktura-dokumentu/4.1-klauzule</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/struktura-dokumentu/4.2-tematy-i-atrybuty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/struktura-dokumentu/4.3-uklad-kontroli</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/terminy-definicje/03.1-terminy-definicje</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/terminy-definicje/03.2-skroty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/opracowanie-iso27002/zakres</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/certyfikaty/porownanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/certyfikaty/przygotowanie</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/certyfikaty/sciezki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/checklisty/devtools</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/checklisty/iso-nis2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/checklisty/red-vs-blue</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/checklisty/testy-api</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/narzedzia/analiza-pakietow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/narzedzia/automatyzacja</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/narzedzia/devtools-postman</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/narzedzia/siem</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/narzedzia/skanery-podatnosci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/narzedzia/testy-penetracyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/obowiazki/code-review-threat-modeling</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/obowiazki/monitorowanie-i-logi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/obowiazki/skanowanie-i-incydenty</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/obowiazki/testy-penetracyjne</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/praktyki-i-rozwoj/bugbounty-ctf</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/praktyki-i-rozwoj/dzien-pracy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/praktyki-i-rozwoj/jak-sie-rozwijac</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/praktyki-i-rozwoj/zrodla-nauki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/przyszlosc/sektory</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/przyszlosc/trendy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/przyszlosc/wyzwania</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/spis-tresci</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/wprowadzenie/kim-jest-security-engineer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/wprowadzenie/role-w-zespole</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/wprowadzenie/wspolpraca-z-innymi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/zgodnosc/ai-act</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/zgodnosc/audyty-i-polityki</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/zgodnosc/iso27001</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/zgodnosc/nis2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/security-engineer-docs/zgodnosc/rodo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/docs/wykaz-zabezpieczen</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.majdak.online/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>