<?xml version="1.0" encoding="UTF-8"?><ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>cyber-security-training</Name><Prefix></Prefix><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>creating-a-cyber-security-training-plan-a-how-to-guide.html</Key><LastModified>2024-09-05T12:48:54.874Z</LastModified><ETag>&quot;70ccb7ff53a829e67b085e9de65bf42e&quot;</ETag><Size>23063</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>cyber-security-training-trends-to-watch-in-2024.html</Key><LastModified>2024-09-05T12:48:54.559Z</LastModified><ETag>&quot;2bdaf30ef5c024dc5d1e315279f7b7fd&quot;</ETag><Size>23075</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>feed.xml</Key><LastModified>2024-09-05T12:48:55.989Z</LastModified><ETag>&quot;1572c9eebd2acde5d5279971c07efb0c&quot;</ETag><Size>59263</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>how-cyber-security-training-prevents-costly-data-breaches.html</Key><LastModified>2024-09-05T12:48:54.264Z</LastModified><ETag>&quot;e53eab62b47af7c3d678c92d619449a3&quot;</ETag><Size>23044</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-resilience-meaning-1.jpg</Key><LastModified>2024-09-05T12:48:57.005Z</LastModified><ETag>&quot;893e829584d399284d760187994d103a&quot;</ETag><Size>229250</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-resilience-meaning-2.jpg</Key><LastModified>2024-09-05T12:48:57.180Z</LastModified><ETag>&quot;18e5600a860830174b2bc96c3f134827&quot;</ETag><Size>213722</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-resilience-meaning-3.jpg</Key><LastModified>2024-09-05T12:48:57.359Z</LastModified><ETag>&quot;eaa49acebd0fc4e71a66b79a81df18a3&quot;</ETag><Size>153760</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-resilience-meaning-4.jpg</Key><LastModified>2024-09-05T12:48:57.535Z</LastModified><ETag>&quot;1997bec281c93d977ffef9b321803ce5&quot;</ETag><Size>229217</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-resilience-meaning.jpg</Key><LastModified>2024-09-05T12:48:56.675Z</LastModified><ETag>&quot;a19ac13353f89bab3817c83a843def05&quot;</ETag><Size>136993</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-training-1.jpg</Key><LastModified>2024-09-05T12:48:57.893Z</LastModified><ETag>&quot;304b756030f89093fddb8ba52a88753e&quot;</ETag><Size>267849</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-training-2.jpg</Key><LastModified>2024-09-05T12:48:58.069Z</LastModified><ETag>&quot;3fdc47849d3a732e6a8e1504145df34d&quot;</ETag><Size>231945</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-training-3.jpg</Key><LastModified>2024-09-05T12:48:58.244Z</LastModified><ETag>&quot;dd1a72627ba9738024356271fcb4e217&quot;</ETag><Size>218055</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-training-4.jpg</Key><LastModified>2024-09-05T12:48:58.420Z</LastModified><ETag>&quot;14fc7579f11f3c074dfbf556f6faf6c0&quot;</ETag><Size>276831</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-training.jpg</Key><LastModified>2024-09-05T12:48:57.710Z</LastModified><ETag>&quot;9bae4ee00051b6f000985089ccbbd9d2&quot;</ETag><Size>214015</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/logo.jpg</Key><LastModified>2024-09-05T12:48:58.591Z</LastModified><ETag>&quot;ccf17591d84f794165d6ef63bf91ac18&quot;</ETag><Size>5857</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/logox1000.jpg</Key><LastModified>2024-09-05T12:48:58.761Z</LastModified><ETag>&quot;6d1af91cb657e334b24496e62ef21235&quot;</ETag><Size>38901</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>index.html</Key><LastModified>2024-09-05T12:48:53.648Z</LastModified><ETag>&quot;432b2aa01e3533cd7f0e66998918b246&quot;</ETag><Size>39920</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>interactive-vs-traditional-cyber-security-training-which-wins.html</Key><LastModified>2024-09-05T12:48:55.163Z</LastModified><ETag>&quot;52ff28a1a90848c7e53ecbd783bb9d34&quot;</ETag><Size>23118</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>page-urls.pdf</Key><LastModified>2024-09-05T12:48:58.968Z</LastModified><ETag>&quot;fcfaaf6595d552411607a220a4c0b80e&quot;</ETag><Size>7928</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>privacy-policy.html</Key><LastModified>2024-09-05T12:48:55.665Z</LastModified><ETag>&quot;5f0e1673156b90e065100b4b435b700f&quot;</ETag><Size>14211</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>robots.txt</Key><LastModified>2024-09-05T12:48:56.346Z</LastModified><ETag>&quot;d24f6271b283eb411a089083de042860&quot;</ETag><Size>290</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>sitemap.html</Key><LastModified>2024-09-05T12:48:56.177Z</LastModified><ETag>&quot;0bcf6979920a13f7b34274f137d511d4&quot;</ETag><Size>10117</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>success-stories-how-cyber-security-training-saved-companies.html</Key><LastModified>2024-09-05T12:48:55.458Z</LastModified><ETag>&quot;51124bc79aead07a2cbfba42e97b3a05&quot;</ETag><Size>23252</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>top-cyber-security-training-programs-to-boost-skills.html</Key><LastModified>2024-09-05T12:48:53.951Z</LastModified><ETag>&quot;fa475133f056a332689efdcc16e7e867&quot;</ETag><Size>23100</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Marker></Marker></ListBucketResult>