<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cyberstorm.yfas.or.id/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/analisis-malware/</loc><lastmod>2025-07-21T20:39:44+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/jenis-jenis-malware/</loc><lastmod>2025-07-10T08:56:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/cara-kerja-malware/</loc><lastmod>2025-05-29T19:02:42+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/analisa-malware/</loc><lastmod>2025-01-30T12:19:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-2/</loc><lastmod>2025-07-10T08:51:39+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan/</loc><lastmod>2025-02-13T15:30:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-3/</loc><lastmod>2025-07-10T09:13:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pengertian-analisis-statis/</loc><lastmod>2025-05-07T11:55:36+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/menentukan-tipe-file-malware/</loc><lastmod>2025-05-07T11:55:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/fingerprinting-malware-hashing/</loc><lastmod>2025-07-10T09:28:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ekstraksi-strings/</loc><lastmod>2025-07-21T20:40:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pemeriksaan-struktur-pe-portable-executable/</loc><lastmod>2025-07-10T09:50:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/deteksi-obfuscation-packers/</loc><lastmod>2025-07-10T10:00:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/analisis-multi-av-scanning/</loc><lastmod>2025-07-10T09:19:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-4/</loc><lastmod>2025-07-10T11:10:25+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/sandbox/</loc><lastmod>2025-07-10T11:14:21+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/monitoring-proses-dan-api-calls/</loc><lastmod>2025-07-10T11:41:12+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/analisis-jaringan-network-analysis/</loc><lastmod>2025-07-10T11:48:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/instalasi-lingkungan-sandboxing/</loc><lastmod>2025-04-21T12:05:58+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-5/</loc><lastmod>2025-05-29T18:51:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/downloaders-launchers/</loc><lastmod>2025-05-29T18:52:42+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/backdoors/</loc><lastmod>2025-05-29T18:52:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/credential-stealers/</loc><lastmod>2025-05-29T18:53:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/persistence-mechanisms/</loc><lastmod>2025-05-29T18:53:08+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-6/</loc><lastmod>2025-02-17T21:52:44+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/launcher/</loc><lastmod>2025-04-22T10:35:35+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/process-injection/</loc><lastmod>2025-04-22T10:35:42+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/process-replacement/</loc><lastmod>2025-04-22T10:35:49+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/hook-injection/</loc><lastmod>2025-04-22T10:35:56+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/detours/</loc><lastmod>2025-04-22T10:36:03+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/apc-injection/</loc><lastmod>2025-04-22T10:36:09+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-7/</loc><lastmod>2025-04-22T10:37:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/simple-ciphers/</loc><lastmod>2025-04-22T10:36:34+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/common-cryptographic-algorithms/</loc><lastmod>2025-04-22T10:37:10+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/custom-encoding-in-malware/</loc><lastmod>2025-04-22T10:37:14+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pendahuluan-8/</loc><lastmod>2025-05-30T14:18:57+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pengenalan-hacking/</loc><lastmod>2025-05-09T14:50:47+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/penetration-testing-uji-penetrasi/</loc><lastmod>2025-05-13T08:46:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/security-audit-terminologi/</loc><lastmod>2025-05-09T14:52:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/etika-mindset-dalam-penetration-testing/</loc><lastmod>2025-05-09T14:52:37+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/pendahuluan-9/</loc><lastmod>2025-08-17T13:54:47+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/pengertian-dan-ruang-lingkup-forensik-digital/</loc><lastmod>2025-08-17T14:07:10+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/manfaat-dan-tujuan-forensik-digital/</loc><lastmod>2025-08-17T14:46:16+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/prinsip-dan-etika-dalam-forensik-digital/</loc><lastmod>2025-08-17T14:57:08+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/pendahuluan-10/</loc><lastmod>2025-05-30T18:55:44+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengumpulkan-informasi-insiden-dan-alat-bantu/</loc><lastmod>2025-05-30T18:56:19+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mempersiapkan-penanganan-insiden-secara-seketika/</loc><lastmod>2025-05-30T18:56:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mempersiapkan-pelaksanaan-tugas-dalam-tim/</loc><lastmod>2025-05-30T18:57:10+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/pendahuluan-11/</loc><lastmod>2025-05-30T18:57:38+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/identifikasi-bukti-elektronik-fisik-mandiri-standalone-devices/</loc><lastmod>2025-05-30T18:58:14+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/pendahuluan-12/</loc><lastmod>2025-05-08T12:45:31+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/launcher-2/</loc><lastmod>2025-05-08T12:46:39+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/process-injection-2/</loc><lastmod>2025-05-08T12:50:53+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/process-replacement-2/</loc><lastmod>2025-05-08T12:50:13+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/hook-injection-2/</loc><lastmod>2025-05-07T14:48:48+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/detours-2/</loc><lastmod>2025-05-07T14:56:00+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/apc-injection-2/</loc><lastmod>2025-05-07T15:00:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/pendahuluan-13/</loc><lastmod>2025-03-30T18:48:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/simple-ciphers-2/</loc><lastmod>2025-03-30T19:21:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/common-cryptographic-algorithms-2/</loc><lastmod>2025-03-30T19:21:12+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/custom-encoding-in-malware-2/</loc><lastmod>2025-03-30T19:21:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/decoding/</loc><lastmod>2025-03-30T19:22:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/anti-disassembly/</loc><lastmod>2025-05-30T11:06:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/anti-debugging/</loc><lastmod>2025-05-29T20:20:17+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/pendahuluan-14/</loc><lastmod>2025-04-01T18:23:39+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/pendahuluan-15/</loc><lastmod>2025-04-01T23:02:00+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/anatomi-dan-mekanisme-packer/</loc><lastmod>2025-05-29T20:21:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/identifikasi-file-terpack/</loc><lastmod>2025-04-01T23:11:19+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/teknik-unpacking/</loc><lastmod>2025-04-01T23:11:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/packer-spesifik-dan-teknik-unpacking-nya/</loc><lastmod>2025-04-01T23:11:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/unpacking-dll-dan-tantangan-khusus/</loc><lastmod>2025-04-01T23:11:55+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/persiapan-praktikum/</loc><lastmod>2025-08-02T20:51:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/metodologi/</loc><lastmod>2025-05-09T14:52:24+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/identifikasi-bukti-elektronik-fisik-yang-terkoneksi-ke-jaringan/</loc><lastmod>2025-05-30T18:58:44+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/pendahuluan-16/</loc><lastmod>2025-05-30T18:59:11+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengenali-pihak-pihak-yang-relevan-dengan-insiden/</loc><lastmod>2025-05-30T19:00:57+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengumpulkan-barang-bukti-non-elektronik/</loc><lastmod>2025-05-30T19:02:08+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/integrasi-bukti-digital-dan-non-digital/</loc><lastmod>2025-05-30T19:03:06+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/konsep-dasar-information-gathering/</loc><lastmod>2025-05-13T08:47:50+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/teknik-pengumpulan-informasi-pasif/</loc><lastmod>2025-05-26T22:06:16+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/teknik-pengumpulan-informasi-aktif/</loc><lastmod>2025-05-13T08:48:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/persiapan-praktikum-2/</loc><lastmod>2025-06-25T10:34:44+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/enumeration/</loc><lastmod>2025-05-26T22:39:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/scanning-dengan-nessus-openvas-dan-nikto/</loc><lastmod>2025-06-26T10:25:34+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/persiapan-praktikum-3/</loc><lastmod>2025-06-25T10:24:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/konsep-dasar-eksploitasi/</loc><lastmod>2025-05-13T10:05:41+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/common-vulnerabilities-and-exposures-cve/</loc><lastmod>2025-05-13T11:20:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/dasar-dasar-metasploit-framework/</loc><lastmod>2025-05-13T11:22:23+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/hydra/</loc><lastmod>2025-05-18T15:00:26+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/persiapan-praktikum-4/</loc><lastmod>2025-06-25T10:27:00+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/privilege-escalation/</loc><lastmod>2025-05-27T15:16:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/teknik-backdooring/</loc><lastmod>2025-05-30T13:20:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/persiapan-praktikum-5/</loc><lastmod>2025-06-25T10:34:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/penulisan-laporan-hasil-uji-penetrasi/</loc><lastmod>2025-05-15T21:48:48+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/eksploitasi-dan-serangan-dengan-metasploit/</loc><lastmod>2025-05-27T10:40:40+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/network-attribution/</loc><lastmod>2025-05-08T12:13:48+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pendahuluan-17/</loc><lastmod>2025-05-30T13:58:12+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pendahuluan-18/</loc><lastmod>2025-06-25T10:38:56+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pendahuluan-19/</loc><lastmod>2025-06-25T10:37:56+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pendahuluan-20/</loc><lastmod>2025-05-30T13:59:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/pendahuluan-21/</loc><lastmod>2025-05-30T14:11:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/memilih-opsi-akuisisi-sesuai-kondisi/</loc><lastmod>2025-05-30T21:47:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengumpulkan-bukti-elektronik-dalam-kondisi-hidup-on/</loc><lastmod>2025-05-30T21:48:41+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengumpulkan-bukti-elektronik-dalam-kondisi-mati-off/</loc><lastmod>2025-08-02T21:07:03+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/menyegel-data-dengan-fungsi-verifikasi/</loc><lastmod>2025-05-30T21:50:38+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengamankan-bukti-dengan-prinsip-keamanan/</loc><lastmod>2025-05-30T21:53:26+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/mengemas-dan-mengirim-bukti-elektronik/</loc><lastmod>2025-05-27T15:52:00+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/pengenalan-forensik-jaringan/</loc><lastmod>2025-05-30T21:59:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/teknik-pengumpulan-bukti-jaringan/</loc><lastmod>2025-05-30T22:01:06+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/identifikasi-dan-analisis-metadata-file/</loc><lastmod>2025-05-30T22:01:39+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/teknik-analisis-hidden-files/</loc><lastmod>2025-05-30T22:02:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/konsep-dasar-steganografi/</loc><lastmod>2025-05-31T13:51:05+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/deteksi-dan-analisis-steganografi/</loc><lastmod>2025-07-07T14:10:47+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/alat-identifikasi-target-standar-dan-alat-os-fingerprinting/</loc><lastmod>2025-05-13T08:48:35+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/konsep-dasar-scanning-enumeration/</loc><lastmod>2025-05-13T09:53:49+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/identifikasi-dan-akuisisi-data-dari-perangkat-android/</loc><lastmod>2025-06-12T12:33:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/analisis-aplikasi-dan-log-perangkat/</loc><lastmod>2025-06-13T14:36:47+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/identifikasi-bukti-dalam-web-browser/</loc><lastmod>2025-06-12T12:32:14+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/teknik-investigasi-web-browser/</loc><lastmod>2025-06-12T12:38:53+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/prinsip-dasar-penyusunan-laporan-forensik-digital/</loc><lastmod>2025-05-30T22:08:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/struktur-laporan-forensik-digital/</loc><lastmod>2025-05-30T22:08:34+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/penyajian-laporan-di-hadapan-hukum/</loc><lastmod>2025-05-30T22:08:49+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/lessons/tantangan-umum-dalam-penyusunan-laporan-forensik-digital/</loc><lastmod>2025-05-30T22:09:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/enumeration-2/</loc><lastmod>2025-05-07T11:57:24+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/injection/</loc><lastmod>2025-05-07T11:57:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/common-vulnerability-scoring-system-cvss/</loc><lastmod>2025-05-14T09:58:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/contoh-laporan-hasil-uji-penetrasi/</loc><lastmod>2025-05-27T19:48:55+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/evasion/</loc><lastmod>2025-05-07T11:57:37+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/spying/</loc><lastmod>2025-05-07T11:57:42+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/internet/</loc><lastmod>2025-05-07T11:57:49+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/anti-debugging-2/</loc><lastmod>2025-05-07T11:57:55+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ransomware/</loc><lastmod>2025-05-07T11:58:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/introduction-to-malapi-io/</loc><lastmod>2025-05-04T22:52:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-3-2/</loc><lastmod>2025-02-13T22:03:38+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pengertian-analisis-statis-2/</loc><lastmod>2025-02-13T22:07:21+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/menentukan-tipe-file-malware-2/</loc><lastmod>2025-02-13T22:12:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/fingerprinting-malware-hashing-2/</loc><lastmod>2025-02-13T22:20:59+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ekstraksi-strings-2/</loc><lastmod>2025-02-13T22:27:34+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pemeriksaan-struktur-pe-portable-executable-2/</loc><lastmod>2025-02-13T22:31:37+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/deteksi-obfuscation-packers-2/</loc><lastmod>2025-02-16T16:40:12+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/analisis-multi-av-scanning-2/</loc><lastmod>2025-02-16T21:47:16+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-analisis-statis/</loc><lastmod>2025-07-21T20:41:19+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/operations-security-opsec/</loc><lastmod>2025-05-08T12:25:54+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/lessons/snort/</loc><lastmod>2025-05-08T12:37:06+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/pendahuluan-9-2/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/pengertian-dan-ruang-lingkup-forensik-digital-2/</loc><lastmod>2025-05-10T18:13:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/manfaat-dan-tujuan-forensik-digital-2/</loc><lastmod>2025-05-10T20:50:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/prinsip-dan-etika-dalam-forensik-digital-2/</loc><lastmod>2025-05-10T20:52:47+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/pendahuluan-22/</loc><lastmod>2025-05-10T20:53:30+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengumpulkan-informasi-insiden-dan-alat-bantu-2/</loc><lastmod>2025-05-10T20:53:42+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mempersiapkan-penanganan-insiden-secara-seketika-2/</loc><lastmod>2025-05-10T20:59:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mempersiapkan-pelaksanaan-tugas-dalam-tim-2/</loc><lastmod>2025-05-10T21:01:06+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/pendahuluan-23/</loc><lastmod>2025-05-16T20:08:58+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/identifikasi-bukti-elektronik-fisik-mandiri-standalone-devices-2/</loc><lastmod>2025-05-16T20:22:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mencari-bukti-elektronik-fisik-yang-terkoneksi-ke-jaringan/</loc><lastmod>2025-05-16T20:29:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/pendahuluan-24/</loc><lastmod>2025-05-16T21:17:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengenali-pihak-pihak-yang-relevan-dengan-insiden-2/</loc><lastmod>2025-05-20T15:06:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengumpulkan-barang-bukti-non-elektronik-2/</loc><lastmod>2025-05-16T22:05:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/integrasi-bukti-digital-dan-non-digital-2/</loc><lastmod>2025-05-16T22:11:59+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/memilih-opsi-akuisisi-sesuai-kondisi-2/</loc><lastmod>2025-05-16T22:14:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengumpulkan-bukti-elektronik-dalam-kondisi-hidup-on-2/</loc><lastmod>2025-05-16T22:18:10+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengumpulkan-bukti-elektronik-dalam-kondisi-mati-off-2/</loc><lastmod>2025-05-16T22:21:21+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/menyegel-data-dengan-fungsi-verifikasi-2/</loc><lastmod>2025-05-16T21:06:07+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengamankan-bukti-dengan-prinsip-keamanan-2/</loc><lastmod>2025-05-17T21:03:41+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/mengemas-dan-mengirim-bukti-elektronik-2/</loc><lastmod>2025-05-17T21:08:30+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/pengenalan-forensik-jaringan-2/</loc><lastmod>2025-05-16T20:38:23+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/teknik-pengumpulan-bukti-jaringan-2/</loc><lastmod>2025-05-16T20:36:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/identifikasi-dan-analisis-metadata-file-2/</loc><lastmod>2025-05-16T21:09:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/teknik-analisis-hidden-files-2/</loc><lastmod>2025-05-16T21:13:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/konsep-dasar-steganografi-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/deteksi-dan-analisis-steganografi-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/identifikasi-dan-akuisisi-data-dari-perangkat-android-2/</loc><lastmod>2025-05-20T15:04:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/analisis-aplikasi-dan-log-perangkat-2/</loc><lastmod>2025-05-16T21:19:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/identifikasi-dan-analisis-bukti-dalam-web-browser-2/</loc><lastmod>2025-05-20T15:34:08+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/teknik-investigasi-web-browser-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/prinsip-dasar-penyusunan-laporan-forensik-digital-2/</loc><lastmod>2025-05-20T15:16:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/struktur-laporan-forensik-digital-2/</loc><lastmod>2025-05-20T15:25:30+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/penyajian-laporan-di-hadapan-hukum-2/</loc><lastmod>2025-05-20T15:28:41+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/lessons/tantangan-umum-dalam-penyusunan-laporan-forensik-digital-2/</loc><lastmod>2025-05-20T15:33:10+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/karakteristik-malware/</loc><lastmod>2025-05-29T19:06:18+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/defenisi-malware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/jenis-jenis-malware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/cara-kerja-malware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/pendahuluan-2-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/karakteristik-malware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/instalasi-lingkungan-isolasi-analisis-malware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/pendahuluan-3-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/pengertian-analisis-statis-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/menentukan-tipe-file-malware-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/fingerprinting-malware-hashing-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/ekstraksi-strings-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/pemeriksaan-struktur-pe-portable-executable-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/deteksi-obfuscation-packers-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/analisis-multi-av-scanning-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/video-analisis-statis-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/video-analisis-virustotal-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/pendahuluan-4-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/menjalankan-malware-di-lingkungan-terisolasi-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/monitoring-proses-dan-api-calls-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/analisis-jaringan-network-analysis-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/deteksi-perubahan-registry-dan-file-system-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/reverse-engineering-dinamis-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/enumeration-2-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/injection-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/evasion-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/spying-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/internet-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/anti-debugging-2-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/ransomware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/introduction-to-malapi-io-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/pendahuluan-5-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/downloaders-launchers-2/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/backdoors-2/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/credential-stealers-2/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/persistence-mechanisms-2/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/lessons/instalasi-lingkungan-sandboxing-3/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/menjalankan-malware/</loc><lastmod>2025-07-10T11:18:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ida-pro-1/</loc><lastmod>2025-07-10T12:09:30+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ghidra/</loc><lastmod>2025-05-30T10:15:00+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/anti-disassembly-1/</loc><lastmod>2025-07-10T14:07:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/anti-debugging-1/</loc><lastmod>2025-07-10T14:21:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/unpacking-malware/</loc><lastmod>2025-05-31T16:34:07+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/pendahuluan-25/</loc><lastmod>2025-07-10T10:04:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/analisis-network-traffic/</loc><lastmod>2025-05-30T10:51:09+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/teknik-persistence/</loc><lastmod>2025-05-30T13:21:10+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-analisis-dinamis/</loc><lastmod>2025-05-31T16:49:29+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/lessons/persiapan-ujian/</loc><lastmod>2025-06-29T14:05:41+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/struktur-mesin-virtual/</loc><lastmod>2025-07-10T10:10:21+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/menyiapkan-mesin-virtual-untuk-analisis-malware/</loc><lastmod>2025-07-10T10:18:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-menyiapkan-mesin-virtual-untuk-analisis-malware/</loc><lastmod>2025-07-10T10:18:26+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/menggunakan-mesin-virtual-untuk-analisis-malware/</loc><lastmod>2025-07-10T10:23:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ida-pro-2/</loc><lastmod>2025-07-10T12:18:08+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/combining-dynamic-and-static-analysis-techniques-1/</loc><lastmod>2025-07-10T13:53:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/combining-dynamic-and-static-analysis-techniques-2/</loc><lastmod>2025-07-10T14:01:21+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/anti-disassembly-2/</loc><lastmod>2025-07-10T14:19:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/anti-debugging-2-3/</loc><lastmod>2025-07-10T14:38:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/ova/</loc><lastmod>2025-07-14T14:51:00+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/latihan-soal/</loc><lastmod>2025-07-14T15:40:12+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/latihan-analisis/</loc><lastmod>2025-07-21T09:26:14+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-tutorial/</loc><lastmod>2025-07-21T09:28:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-anaisis-dinamsi-2/</loc><lastmod>2025-07-21T09:30:24+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-analisis-statis-2-2/</loc><lastmod>2025-07-21T20:46:58+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-tutorial-1/</loc><lastmod>2025-07-21T09:44:08+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/lessons/video-tutorial-2-2/</loc><lastmod>2025-07-21T09:45:56+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/materi-pembelajaran-melakukan-deteksi-kerentanan-aset-teknologi-informasi-ti/</loc><lastmod>2025-08-07T14:40:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/materi-pembelajaran-melakukan-pemantauan-aset-teknologi-informasi-ti-terhadap-aktivitas-ancaman-siber/</loc><lastmod>2025-08-07T15:27:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/materi-pembelajaran-memberikan-tiket-terhadap-insiden-keamanan-siber/</loc><lastmod>2025-08-07T15:25:27+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/materi-pembelajaran-menganalisis-log-pada-security-operations-center-soc/</loc><lastmod>2025-08-07T15:29:40+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/materi-pembelajaran-melakukan-analisis-keamanan-siber-terhadap-insiden-keamanan-siber-untuk-menentukan-kendali/</loc><lastmod>2025-08-07T15:31:42+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/materi-pembelajaran-menganalisis-dampak-insiden-kemanan-siber/</loc><lastmod>2025-08-07T15:33:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/modul-praktikum-melakukan-deteksi-kerentanan-aset-teknologi-informasi-ti/</loc><lastmod>2025-08-08T11:02:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/modul-praktikum-melakukan-pemantauan-aset-teknologi-informasi-ti-terhadap-aktivitas-ancaman-siber/</loc><lastmod>2025-08-08T11:08:31+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/modul-praktikum-memberikan-tiket-terhadap-insiden-keamanan-siber/</loc><lastmod>2025-08-08T11:10:27+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/modul-praktium-memberikan-tiket-terhadap-insiden-keamanan-siber/</loc><lastmod>2025-08-08T11:13:47+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/modul-praktikum-melakukan-analisis-keamanan-siber-terhadap-insiden-keamanan-siber-untuk-menentukan-kendali/</loc><lastmod>2025-08-08T21:31:36+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/modul-praktikum-menganalisis-dampak-insiden-kemanan-siber/</loc><lastmod>2025-08-08T11:19:58+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/lembar-bantu-praktikum-j-62soc00-005-1/</loc><lastmod>2025-08-08T21:37:31+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/lembar-bantu-praktikum-62soc00-008-1/</loc><lastmod>2025-08-08T21:38:31+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/analisis-malware-2/</loc><lastmod>2025-08-14T10:56:05+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/jenis-jenis-malware-3/</loc><lastmod>2025-08-14T11:01:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/cara-kerja-malware-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/pendahuluan-2-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/karakteristik-malware-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/pendahuluan-3-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/pengertian-analisis-statis-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/menentukan-tipe-file-malware-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/fingerprinting-malware-hashing-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/ekstraksi-strings-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/pemeriksaan-struktur-pe-portable-executable-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/deteksi-obfuscation-packers-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/analisis-multi-av-scanning-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-analisis-statis-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-analisis-statis-2-2-2/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/pendahuluan-4-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/sandbox-2/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/monitoring-proses-dan-api-calls-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/analisis-jaringan-network-analysis-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/menjalankan-malware-2/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-analisis-dinamis-2/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-analisis-dinamsi-2/</loc><lastmod>2025-08-15T20:11:09+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/pendahuluan-25-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/struktur-mesin-virtual-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/menyiapkan-mesin-virtual-untuk-analisis-malware-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-menyiapkan-mesin-virtual-untuk-analisis-malware-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/menggunakan-mesin-virtual-untuk-analisis-malware-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/ova-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/ida-pro-1-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/ghidra-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/ida-pro-2-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/latihan-analisis-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-tutorial-3/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/anti-disassembly-1-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/anti-debugging-1-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/unpacking-malware-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/anti-disassembly-2-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/anti-debugging-2-3-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-tutorial-1-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-tutorial-2-2-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/analisis-network-traffic-3/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/combining-dynamic-and-static-analysis-techniques-1-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/combining-dynamic-and-static-analysis-techniques-2-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/latihan-soal-2/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/lessons/video-tutorial-2-3/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/bahasa-indonesia__trashed/lessons/ejaan-1/</loc><lastmod>2025-08-21T14:36:28+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/tautan-resources-laboratorium-virtual/</loc><lastmod>2025-08-27T19:45:22+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/lessons/requirements-dan-petunjuk-pemasangan-laboratorium-virtual/</loc><lastmod>2025-08-27T19:56:22+07:00</lastmod></url></urlset>
