<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated by All in One SEO - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://learn.securestrategy.co.nz/default.xsl"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:image="https://www.google.com/schemas/sitemap-image/1.1"
	xmlns:xhtml="http://www.w3.org/1999/xhtml"
>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/introduction-to-cyber-security/]]></loc>
		<lastmod><![CDATA[2018-06-18T22:27:13+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/introduction-to-cybersecurity-e1555453141877.jpg]]></image:loc>
			<image:title><![CDATA[introduction to cybersecurity]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/browsing-the-web/]]></loc>
		<lastmod><![CDATA[2018-05-13T23:24:06+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/browsing-the-web.jpg]]></image:loc>
			<image:title><![CDATA[browsing the web]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/email-security/]]></loc>
		<lastmod><![CDATA[2018-05-11T04:19:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/email-security.jpg]]></image:loc>
			<image:title><![CDATA[email security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/fraud/]]></loc>
		<lastmod><![CDATA[2018-05-13T23:26:00+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/fraud.jpg]]></image:loc>
			<image:title><![CDATA[fraud]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/privacy/]]></loc>
		<lastmod><![CDATA[2018-06-18T21:20:22+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/privacy.jpg]]></image:loc>
			<image:title><![CDATA[privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/protecting-yourself-at-home/]]></loc>
		<lastmod><![CDATA[2018-05-13T23:25:24+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/home.jpg]]></image:loc>
			<image:title><![CDATA[home]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/protecting-your-work-account/]]></loc>
		<lastmod><![CDATA[2018-05-13T23:24:57+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/protecting-your-work-account.jpg]]></image:loc>
			<image:title><![CDATA[protecting your work account]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/introduction-to-cyber-security-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-15T03:50:45+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/introduction-to-cybersecurity-e1555453141877.jpg]]></image:loc>
			<image:title><![CDATA[introduction to cybersecurity]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/email-security-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-18T21:07:08+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/email-security.jpg]]></image:loc>
			<image:title><![CDATA[email security]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/browsing-the-web-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-15T03:50:33+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/browsing-the-web.jpg]]></image:loc>
			<image:title><![CDATA[browsing the web]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/protecting-your-work-account-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-18T21:08:53+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/protecting-your-work-account.jpg]]></image:loc>
			<image:title><![CDATA[protecting your work account]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/fraud-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-15T03:50:21+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/fraud.jpg]]></image:loc>
			<image:title><![CDATA[fraud]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/privacy-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-18T21:07:51+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/privacy.jpg]]></image:loc>
			<image:title><![CDATA[privacy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/protecting-yourself-at-home-redpaths/]]></loc>
		<lastmod><![CDATA[2019-02-18T21:09:43+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
		<image:image>
			<image:loc><![CDATA[https://learn.securestrategy.co.nz/wp-content/uploads/2018/03/home.jpg]]></image:loc>
			<image:title><![CDATA[home]]></image:title>
		</image:image>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/redpaths-course/]]></loc>
		<lastmod><![CDATA[2019-05-21T01:58:25+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
	<url>
		<loc language=""><![CDATA[https://learn.securestrategy.co.nz/lessons/cyber-security/]]></loc>
		<lastmod><![CDATA[2019-05-21T03:45:41+00:00]]></lastmod>
		<changefreq><![CDATA[weekly]]></changefreq>
		<priority><![CDATA[0.7]]></priority>
	</url>
</urlset>