<?xml version="1.0" encoding="UTF-8"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
		http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
	<url>
		<loc>https://thecyberacademy.org</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about-us/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/our-team/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/our-partners/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/our-supporters/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/creating-awareness/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/supporting-innovation/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training-support/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/dfet/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/phishing-scamming-and-other-evils/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/data-and-cyber-courses/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/6th-international-conference-on-big-data-in-cyber-security/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/introduction-to-splunk/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/introduction-to-splunk-2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/risk-management-for-cybersec-and-it-managers/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/awareness/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/6th-international-conference-on-big-data-in-cyber-security-2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/the-cyber-academy-presents/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/the-cyber-academy-presents-laura-irvine/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-breakfasts/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/august-2020/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/july-2020/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/june-2020/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/past-cyber-breakfasts/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/3rd-international-conference-in-blockchain-identity-cryptography-2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/gdpr-conference/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/3rd-international-conference-in-blockchain-identity-cryptography/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/webinars/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/think-before-you-click/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/check-your-facts-webinar/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/covid-19-fraud-online/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/news/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/contact-us-2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/our-online-courses/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/law-society-of-scotland/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/interdisciplinary-work/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/copyright-statement/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/accessibility-statement/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/privacy-policy/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/category/news/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/5th-international-conference-big-data-in-cyber-security/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/share_stumbleupon/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/add-a-comment/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/aims/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/cyber-academy-launch/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/dfet/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/joining-us-phdacademicresearcher/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/partners/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/about/people/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/author/w-buchanannapier-ac-uk/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/big-data-in-cyber-security-2018-speakers/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigcyber2017/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigcyber2017/ecs-logo-colour-no-strap/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigcyber2017/logo_splunk_1color_k/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigcyber2017/poster2_bigdata-01/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigdata-speakers/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigdata2018/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bighealth/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/bigip/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/ca001-phishing-scamming-and-other-evils/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cell/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/certificate-incident-response-planning/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/christmas-cyber-and-stem-event-for-school-girls-6-december-2016/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/crypto/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/crypto2017/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/crypto2018/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/crypto2019/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/cell-forensics-course/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/horizon-2020/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/phd-studentships/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/siem/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/the-cost-of-cryptography/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-academy-launch/the-cyber-academy-hosts-iet-christmas-lectures/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-investigation-course/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-principles/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyber-security-masterclass/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cybercamp/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cybercamp/cyber_academy_hi_res/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/cyberdata/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/defcon-group/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/ahswn-si-moving2iot/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/brave-new-world/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/crypto/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/csdf-2018/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/ctf-security-event/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/defcon-group-meeting/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/digital-forensics-and-incident-response-society/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/iet-christmas-lectures-the-internet-of-everything/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/iet-christmas-lectures-the-internet-of-everything-edinburgh/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/international-conference-of-big-data-in-cyber-security/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/new-year-symposium-data-breaches-and-incident-response/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/pcics-2018/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/pgcs-symposium/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/secsoc-2017-the-first-international-workshop-on-secure-smart-societies-in-next-generation-networks/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/secsoc-2018/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/sitn-2017/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/symposium-on-data-integration-in-health-and-social-care/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/event/symposium-on-data-loss-detection-and-prevention/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/4th-international-conference-on-cyber-security-and-education/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/4th-international-conference-on-cyber-security-and-education/cyber-security-conference-2014/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/bigdata/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/bigdata/programme/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/brave-new-world/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/cyber-security-careers/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/international-conference-of-big-data-in-cyber-security/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/list/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/list/tribe_event_display_past_tribe_paged_1/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/masterclassv/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/newyear/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/newyear/dlp2-2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/past-events/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/sdn/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/sdn/symposium-in-software-defined-networks/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/symhealth/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/symposium-on-data-loss-detection-and-prevention/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/symposium-on-data-loss-detection-and-prevention/dlp-programme-and-presenters/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/symposium-on-data-loss-detection-and-prevention/dlp-programme-and-presenters/trend-micro-logo/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/symposium-on-software-defined-architectures-and-networks/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events_ical_1/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/events/ical_1/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/gdpr/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/human/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/incident-response/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/logo3/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/magic/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/masterclass/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/page/2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pcwics-2017/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-cfp/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-conference_program/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-contactus_sponsoring/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-important_dates/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-keynotes/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-organization_committee/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-paper_submission/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-program_committee/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-read_more/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-registration/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-travel_visa/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/pgcs-venue_accommodation/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/phd2/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/professional/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/professional/digital-forensics-society/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/professional/enusec/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/professional/msc-programmes/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/public-engagement/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/robert-ludwiniak/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/secsoc-2017-the-first-international-workshop-on-secure-smart-societies-in-next-generation-networks/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/sitn-2017/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/soclab/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/soclab-launch/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/terms-and-conditions/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/the-cost-of-cryptography/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/cell-site-analysis-workshop/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/courses/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/cyber-investigation-course/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/data-cyber/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/digital-evidence-for-it-professionals/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/digital-evidence-for-solicitors/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/fundamentals-in-digital-forensics-using-encase/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/insider-threat/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/investigating-ddos/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/mac-forensics/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/phishing/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/training/social-media/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/voices/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/xmas/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/4th-international-conference-on-cyber-security-and-education/</loc>
	</url>
	<url>
		<loc>https://thecyberacademy.org/digital-forensics-society/</loc>
	</url>
</urlset>