<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cyberstorm.yfas.or.id/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/quizzes/kuis-pengenalan-malware/</loc><lastmod>2025-05-29T19:08:20+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/quizzes/kuis-analisis-statis/</loc><lastmod>2025-07-14T15:16:39+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/hello-world/quizzes/karakteristik-dan-perilaku-malware/</loc><lastmod>2025-05-29T19:08:24+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/hello-world/quizzes/kuis-covert-malware-launching/</loc><lastmod>2025-02-17T22:59:07+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/quizzes/covert-malware-launching/</loc><lastmod>2025-03-30T18:46:15+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/quizzes/kuis-data-encoding/</loc><lastmod>2025-03-30T19:31:12+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/quizzes/anti-reverse-engineering/</loc><lastmod>2025-04-01T22:30:31+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/quizzes/malware-packing-dan-unpacking/</loc><lastmod>2025-04-01T23:17:11+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-4/</loc><lastmod>2025-09-01T15:14:05+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/hello-world/quizzes/analisis-program-pada-platform-windows/</loc><lastmod>2025-05-04T22:37:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/hello-world/quizzes/kuis-analisis-statis-2/</loc><lastmod>2025-02-16T22:05:55+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/quizzes/analisis-dinamis/</loc><lastmod>2025-05-07T11:50:19+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/quizzes/final-exam/</loc><lastmod>2025-08-18T21:35:09+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisis-malware-lanjutan/quizzes/malware-countermeasure/</loc><lastmod>2025-05-08T12:44:44+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-14/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-2-2/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-3-2/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-5-2/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-6-2/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-7-2/</loc><lastmod>2025-05-09T14:31:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-8-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-9-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-10-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-11-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-12-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/sample-course/quizzes/quiz-13-2/</loc><lastmod>2025-05-09T14:31:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-15/</loc><lastmod>2025-09-01T15:16:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-16/</loc><lastmod>2025-09-01T15:14:17+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/quizzes/kuis-pengenalan-malware-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/quizzes/kuis-analisis-statis-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/quizzes/analisis-dinamis-3/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/quizzes/analisis-program-pada-platform-windows-2/</loc><lastmod>2025-05-29T20:10:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/quizzes/karakteristik-dan-perilaku-malware-2/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-2/quizzes/final-exam-3/</loc><lastmod>2025-05-29T20:10:46+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware/quizzes/self-defending-malware-teknik-unpacking/</loc><lastmod>2025-05-30T11:14:30+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-17/</loc><lastmod>2025-09-01T15:15:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-18/</loc><lastmod>2025-09-01T15:15:49+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-19/</loc><lastmod>2025-09-01T15:16:26+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-16-2/</loc><lastmod>2025-09-01T15:15:24+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-17-2/</loc><lastmod>2025-09-01T15:15:39+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-18-2/</loc><lastmod>2025-09-01T15:15:58+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/final-exam-2/</loc><lastmod>2025-09-01T15:16:58+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/praktikum-final-exam/</loc><lastmod>2025-09-01T15:17:21+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-20/</loc><lastmod>2025-07-08T21:35:52+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz/</loc><lastmod>2025-07-08T21:36:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-2/</loc><lastmod>2025-07-08T21:36:36+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-3/</loc><lastmod>2025-07-08T21:49:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-5/</loc><lastmod>2025-07-08T21:55:31+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-6/</loc><lastmod>2025-07-08T21:55:59+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-7/</loc><lastmod>2025-07-26T20:11:56+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-8/</loc><lastmod>2025-07-09T09:21:20+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-9/</loc><lastmod>2025-07-09T13:27:04+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-10/</loc><lastmod>2025-07-09T13:27:20+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-11/</loc><lastmod>2025-07-09T13:35:01+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/quiz-12/</loc><lastmod>2025-07-09T13:27:43+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/forensik-digital/quizzes/kuis-akhir/</loc><lastmod>2025-07-09T13:41:02+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/uji-penetrasi/quizzes/quiz-19-2-2/</loc><lastmod>2025-09-01T15:16:34+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/quizzes/soal-latihan-l1-soc-analyst-j-62soc00-006-1/</loc><lastmod>2025-08-08T14:21:56+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/quizzes/soal-latihan-l1-soc-analyst-j-62soc00-008-1/</loc><lastmod>2025-08-08T14:54:51+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/quizzes/soal-latihan-j-62soc00-010-1/</loc><lastmod>2025-08-08T20:49:54+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/quizzes/soal-latihan-j-62soc00-011-1/</loc><lastmod>2025-08-08T20:51:37+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/quizzes/soal-latihan-j-62soc00-005-1/</loc><lastmod>2025-08-08T20:52:17+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/l1-soc-analyst/quizzes/soal-latihan-l1-soc-analyst-j-62soc00-018-1/</loc><lastmod>2025-08-08T21:30:45+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/quizzes/kuis-pengenalan-malware-3/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/quizzes/kuis-analisis-statis-4/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/quizzes/analisis-dinamis-5/</loc><lastmod>2025-08-14T08:37:32+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/quizzes/final-exam-5/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/analisa-malware-3/quizzes/self-defending-malware-teknik-unpacking-3/</loc><lastmod>2025-08-14T08:37:33+07:00</lastmod></url><url><loc>https://cyberstorm.yfas.or.id/courses/bahasa-indonesia__trashed/quizzes/kuis-ejaan/</loc><lastmod>2025-08-21T14:37:38+07:00</lastmod></url></urlset>
