<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <!-- Home Page -->
    <url>
        <loc>https://protectthreat.com/</loc>
        <priority>1.0</priority>
    </url>

    <!-- Penetration Testing and Ethical Hacking -->
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/External-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Internal-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Web-Application-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Mobile-Application-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/API-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Wireless-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/VOIP-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Thick-Client-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Firewall-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Firmware-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Infrastructure-Physical-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/MITRE-ATT&amp;CK-Assessment</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/Social-Engineering-Assessment</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/penetration-testing-and-ethical-hacking/ICS-SCADA-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>

    <!-- Red, Blue, Purple Team Services -->
    <url>
        <loc>https://protectthreat.com/services/red,blue,purple-team-services</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/red,blue,purple-team-services/Red-Teaming-Services</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/red,blue,purple-team-services/Blue-Teaming-Services</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/red,blue,purple-team-services/Purple-Team-Services</loc>
        <priority>0.8</priority>
    </url>

    <!-- Cloud Security -->
    <url>
        <loc>https://protectthreat.com/services/cloud-security</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/cloud-security/AWS-Configuration-Review</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/cloud-security/Microsoft-Configuration-Review</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/cloud-security/GCP-Configuration-Review</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/cloud-security/Cloud-Configuration</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/cloud-security/Migration-to-Cloud-from-On-Premise</loc>
        <priority>0.8</priority>
    </url>

    <!-- Security Architecture and Implementation -->
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation/Source-Code-Review</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation/Awareness-Training</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation/Firewall-Setup-with-Support</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation/IDS-IPS-Setup-and-Configuration</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation/Commercial-Tools-Implementation</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/security-architecture-and-implementation/Router-Configuration</loc>
        <priority>0.8</priority>
    </url>

    <!-- Threat Intelligence and Incident Response -->
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response</loc>
        <priority>0.9</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response/Threat-Hunting</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response/Dark-Web-Assessment</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response/Incident-Response</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response/Playbook-Development</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response/SoC-Development-and-Team-Management</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/services/threat-intelligence-and-incident-response/Backup-Continuous-Response</loc>
        <priority>0.8</priority>
    </url>

    <!-- Resources -->
    <!-- Blogs -->
    <url>
        <loc>https://protectthreat.com/blogs</loc>
        <priority>0.9</priority>
    </url>
    <!-- Server Message Block -->
    <url>
        <loc>https://protectthreat.com/blogs/1/Server-Message-Block</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/blogs/2/Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/blogs/2/MITRE-ATT&amp;CK-Assessment</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/blogs/2/Thick-Client-Penetration-Testing</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/blogs/2/Firewall-Penetration-Testing-Services</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/blogs/2/Physical-Penetration-Testing-Services</loc>
        <priority>0.8</priority>
    </url>

    <!-- Industries -->
    <url>
        <loc>https://protectthreat.com/industries</loc>
        <priority>0.9</priority>
    </url>
    
    <url>
        <loc>https://protectthreat.com/industries/Education</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Construction</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Finance</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Government</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Healthcare</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Insurance</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Legal</loc>
        <priority>0.8</priority>
    </url>
    <url>
        <loc>https://protectthreat.com/industries/Manufacturing</loc>
        <priority>0.8</priority>
    </url>

    <!-- Contact Us -->
    <url>
        <loc>https://protectthreat.com/contactus</loc>
        <priority>0.9</priority>
    </url>

    <!-- Demo -->
    <url>
        <loc>https://protectthreat.com/demo</loc>
        <priority>0.9</priority>
    </url>
</urlset>