<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://jan-karel.com/?tenant=jan-karel.com</loc><priority>1.0</priority></url><url><loc>https://jan-karel.com/premium-library/?tenant=jan-karel.com</loc><priority>0.9</priority></url><url><loc>https://jan-karel.com/premium/templates/?tenant=jan-karel.com</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/premium/runbooks/?tenant=jan-karel.com</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/premium/briefings/?tenant=jan-karel.com</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/premium/essays/?tenant=jan-karel.com</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/tools/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/risico-calculator/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/nis2-check/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/datalek-kosten/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/ransomware-readiness/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/fair-analyse/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/phishing-score/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/security-budget/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/incident-response-plan/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/supply-chain-risico/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/security-maturity/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/cyberverzekering-check/?tenant=jan-karel.com</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/risico-calculator/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/nis2-check/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/datalek-kosten/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/ransomware-readiness/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/fair-analyse/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/phishing-score/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/security-budget/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/incident-response-plan/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/supply-chain-risico/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/security-maturity/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/cyberverzekering-check/uitleg/?tenant=jan-karel.com</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/sm-web/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-01-sql-injection-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-01-initiele-toegang-voorkomen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-01-cloud-reconnaissance-voorkomen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-01-cybersecurity-bestuursverantwoordelijkheid/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-01-phishing-en-oplichting/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-01-aanval-verdediging-mapping/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/premium-the-password-is-dead/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-compliance-theatre/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-mediocre-hacker/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-your-backup-is-a-lie/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-lastpass-and-the-lie-of-the-vault/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-nis2-the-reality-check/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-crowdstrike-weekend/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-questionnaire-that-proves-nothing/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-gdpr-data-processing-agreement-template/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-iso27001-information-security-policy-en/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-nis2-incident-response-runbook-en/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-data-breach-procedure-template/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-ai-usage-policy-template/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-ransomware-recovery-playbook-en/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-threat-briefing-april-2026-en/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-snowflake-and-the-door-you-left-open/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-cyber-insurance-fairy-tale/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-mfa-fatigue-and-the-teenager-from-argentina/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-the-logs-nobody-reads/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-the-insider-nobody-saw-coming/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-security-awareness-theater-en/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-we-use-aws-so-we-are-secure/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-the-patch-you-cannot-apply/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-moveit-and-the-door-already-open/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/premium-security-theatre-and-the-airport/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/premium-zero-day-as-a-marketing-term/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/premium-we-are-pentested-so-we-are-secure/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-02-xss-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-02-detectie-evasion-stoppen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-02-aws-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-02-risicomanagement-risicoanalyse/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-02-wachtwoorden-en-inloggen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-02-implementatie-prioriteiten/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-03-command-injection-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-03-privilege-escalatie-voorkomen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-03-azure-entra-id-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-03-nis2-europese-cyberwetgeving/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-03-telefoon-beveiligen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-03-incidentrespons/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-04-path-traversal-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-04-active-directory-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-04-gcp-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-04-avg-gdpr-privacy-compliance/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-04-computer-beschermen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-04-compliance-governance/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-05-ssti-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-05-kerberos-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-05-container-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-05-bestuurdersaansprakelijkheid/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-05-veilig-internetten-en-wifi/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-05-hardening-checklists/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-06-xxe-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-06-laterale-beweging-stoppen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-06-cicd-pipeline-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-06-security-budget-investeren/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-06-online-winkelen-en-betalen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-06-compliance-mapping/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-07-ssrf-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-07-credential-bescherming/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-07-serverless-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-07-incidentrespons-crisismanagement/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-07-privacy-en-sociale-media/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-07-secret-management-en-key-rotatie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-08-deserialisatie-preventie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-08-adcs-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-08-cloud-laterale-beweging-stoppen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-08-supply-chain-leveranciersrisico/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-08-kinderen-en-internet/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-10-security-architectuur-principes/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-09-client-side-beveiliging/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-09-persistentie-detecteren/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-09-cloud-persistentie-voorkomen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-09-cyberverzekeringen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-09-identiteitsdiefstal-en-datalekken/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-11-reference-architecturen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-10-authenticatie-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-10-tunneling-voorkomen/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-10-cloud-detectie-logging/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-10-security-metrics-bestuursrapportage/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-10-als-het-misgaat/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-12-adr-security-besluitvorming/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/securitymaatregelen/?tenant=jan-karel.com</loc><priority>0.8</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-11-security-headers/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-11-linux-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-11-kubernetes-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-13-threat-modeling-praktijk/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-12-invoer-uitvoer-validatie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-12-windows-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-12-infrastructure-as-code-security/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-13-tls-configuratie/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-13-email-dns-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-13-secrets-management/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-14-api-beveiliging/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-14-mssql-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-15-file-upload-hardening/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-15-netwerksegmentatie-firewall/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-16-oauth-openid-connect/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-16-logging-monitoring-siem/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-17-secure-development-lifecycle/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-17-backup-disaster-recovery/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-18-vulnerability-management/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-19-zero-trust-architectuur/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-20-wireless-fysieke-beveiliging/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-21-security-awareness/?tenant=jan-karel.com</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url></urlset>