<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://learn.iita.org/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/password-strength-workshop/</loc><lastmod>2026-04-30T09:05:00+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/phishing-email-identification-exercise/</loc><lastmod>2026-04-30T09:05:51+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/data-classification-exercise/</loc><lastmod>2026-04-30T10:54:14+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/data-breach-case-study-analysis/</loc><lastmod>2026-04-30T10:56:19+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/secure-data-handling-simulation/</loc><lastmod>2026-04-30T10:56:48+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/incident-response-simulation-tabletop-exercise/</loc><lastmod>2026-04-30T11:00:22+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/incident-reporting-drill/</loc><lastmod>2026-04-30T11:01:09+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/role-play-exercise/</loc><lastmod>2026-04-30T11:01:42+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/indicator-identification-exercise/</loc><lastmod>2026-04-30T11:02:12+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/access-control-design-exercise/</loc><lastmod>2026-04-30T11:46:43+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/network-segmentation-planning-exercise/</loc><lastmod>2026-04-30T11:46:57+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/backup-recovery-simulation/</loc><lastmod>2026-04-30T11:47:13+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/policy-development-workshop/</loc><lastmod>2026-04-30T11:47:24+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/risk-assessment-exercise/</loc><lastmod>2026-04-30T11:47:52+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/remote-work-risk-assessment-exercise/</loc><lastmod>2026-04-30T13:49:16+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/secure-file-sharing-simulation/</loc><lastmod>2026-04-30T13:49:30+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/virtual-meeting-security-setup-exercise/</loc><lastmod>2026-04-30T13:49:40+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/phishing-in-remote-context-exercise/</loc><lastmod>2026-04-30T13:50:03+01:00</lastmod></url><url><loc>https://learn.iita.org/courses/cybersecure-nigeria-course/assignments/home-network-security-checklist/</loc><lastmod>2026-04-30T13:50:12+01:00</lastmod></url></urlset>
