<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 3:04 am by All in One SEO v4.9.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://ersegment.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>E R Segment</title>
		<link><![CDATA[https://ersegment.com]]></link>
		<description><![CDATA[E R Segment]]></description>
		<lastBuildDate><![CDATA[Thu, 02 Apr 2026 07:35:52 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://ersegment.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-13-port-scanning-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-13-port-scanning-2/]]></link>
			<title>DAY-13 Port Scanning</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:35:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-11-dns/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-11-dns/]]></link>
			<title>DAY-11 DNS</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 05:21:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-14-open-vpn-setup/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-14-open-vpn-setup/]]></link>
			<title>DAY-14 Open VPN Setup</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:40:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-8-cross-site-scripting/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-8-cross-site-scripting/]]></link>
			<title>DAY-8 Cross site scripting</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:37:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-7-cross-site-scripting/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-7-cross-site-scripting/]]></link>
			<title>DAY-7 Cross site scripting</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:34:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-26-social-engineering-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-26-social-engineering-2/]]></link>
			<title>DAY-26 Social Engineering -2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:04:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-33-social-engineering-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-33-social-engineering-2/]]></link>
			<title>DAY-33 Social Engineering -2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:01:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-32-social-engineering/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-32-social-engineering/]]></link>
			<title>DAY-32 Social Engineering</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 17:02:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-25-social-engineering/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-25-social-engineering/]]></link>
			<title>DAY-25 Social Engineering</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 17:02:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-10-os-architecture/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-10-os-architecture/]]></link>
			<title>DAY-10 OS Architecture</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:08:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-9-osi-model/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-9-osi-model/]]></link>
			<title>DAY-9 OSI Model</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:04:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-8-mac-address/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-8-mac-address/]]></link>
			<title>DAY-8 MAC Address</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:02:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-7-dhcp-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-7-dhcp-2/]]></link>
			<title>DAY-7 DHCP</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:58:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-6-logical-address-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-6-logical-address-2/]]></link>
			<title>DAY-6 Logical Address</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:55:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-5-enterprise-n-w-arch/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-5-enterprise-n-w-arch/]]></link>
			<title>DAY 5 Enterprise N W arch</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:51:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-4-ipsubnetmasking/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-4-ipsubnetmasking/]]></link>
			<title>DAY-4 IPSubnetmasking</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:45:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-3-router-switches-server/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-3-router-switches-server/]]></link>
			<title>DAY-3 Router &#038;&#038; Switches &#038;&#038; Server</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:38:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-2-network-topologies-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-2-network-topologies-2/]]></link>
			<title>DAY-2 Network Topologies</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:23:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-1-introduction-to-network/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-1-introduction-to-network/]]></link>
			<title>DAY-1 Introduction to Network</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:09:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-7-ids-ips/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-7-ids-ips/]]></link>
			<title>DAY-7 IDS &#038;&#038; IPS</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 08:59:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-12-hostdiscover-scanning/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-12-hostdiscover-scanning/]]></link>
			<title>DAY-12 HostDiscover Scanning</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 08:52:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-24-sniffing-countermeasures/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-24-sniffing-countermeasures/]]></link>
			<title>DAY-24 Sniffing Countermeasures</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 05:51:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-31-sniffing-countermeasures/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-31-sniffing-countermeasures/]]></link>
			<title>DAY-31 Sniffing Countermeasures</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 05:49:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-22-report-writing-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-22-report-writing-2/]]></link>
			<title>DAY-22 Report Writing</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 05:36:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-22-report-writing/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-22-report-writing/]]></link>
			<title>DAY-22 Report Writing</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 05:35:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-7-broken-auth-otp-bypassing-and-session-management-part-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-7-broken-auth-otp-bypassing-and-session-management-part-2/]]></link>
			<title>DAY-7 Broken Auth (OTP Bypassing and Session Management) Part-2</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 15:44:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-6-broken-authentication-and-session-management-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-6-broken-authentication-and-session-management-2/]]></link>
			<title>DAY-6 Broken Authentication and Session Management</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:33:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-6-broken-authentication-and-session-management/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-6-broken-authentication-and-session-management/]]></link>
			<title>DAY-6 Broken Authentication and Session Management</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:32:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-21-bugbounty-platforms-analyze-programs/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-21-bugbounty-platforms-analyze-programs/]]></link>
			<title>DAY-21 BugBounty Platforms &#038;&#038; Analyze Programs</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:17:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-21-bugbounty-platform-analyze-programs/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-21-bugbounty-platform-analyze-programs/]]></link>
			<title>DAY-21 BugBounty Platform &#038;&#038; Analyze Programs</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:16:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-23-sniffing/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-23-sniffing/]]></link>
			<title>DAY-23 Sniffing</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-30-sniffing/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-30-sniffing/]]></link>
			<title>DAY-30 Sniffing</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 06:07:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/]]></guid>
			<link><![CDATA[https://ersegment.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 19 Feb 2026 09:03:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-11-network-scanning/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-11-network-scanning/]]></link>
			<title>DAY-11 Network Scanning</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 13:14:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-10-email-analysis/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-10-email-analysis/]]></link>
			<title>DAY-10 Email Analysis</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 05:21:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-22-dos-ddos-mitigations/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-22-dos-ddos-mitigations/]]></link>
			<title>DAY-22 DOS &#038;&#038; DDOS Mitigations</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 11:28:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-29-dos-ddos-mitigations/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-29-dos-ddos-mitigations/]]></link>
			<title>DAY-29 DOS &#038;&#038; DDOS Mitigations</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 11:27:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-5-post-based-sqli-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-5-post-based-sqli-2/]]></link>
			<title>DAY-5 Post Based SQLI</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 05:01:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-5-post-based-sqli/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-5-post-based-sqli/]]></link>
			<title>DAY-5 Post Based SQLI</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 05:00:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-4-blind-boolean-blind-time-based-sqli-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-4-blind-boolean-blind-time-based-sqli-2/]]></link>
			<title>DAY-4 Blind Boolean &#038;&#038; Blind Time Based SQLI</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 04:51:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-4-blind-boolean-blind-time-based-sqli/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-4-blind-boolean-blind-time-based-sqli/]]></link>
			<title>DAY-4 Blind Boolean &#038;&#038; Blind Time Based SQLI</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 04:50:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-20-api-testing-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-20-api-testing-2/]]></link>
			<title>DAY-20 API Testing</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 04:38:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-20-api-testing/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-20-api-testing/]]></link>
			<title>DAY-20 API Testing</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 04:37:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-19-automated-pentesting-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-53/lesson/day-19-automated-pentesting-2/]]></link>
			<title>DAY-19 Automated Pentesting</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 05:54:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-19-automated-pentesting/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-52/lesson/day-19-automated-pentesting/]]></link>
			<title>DAY-19 Automated Pentesting</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 05:53:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-6-firewalls/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-6-firewalls/]]></link>
			<title>DAY-6 Firewalls</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 05:25:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-9-maltego-3/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-9-maltego-3/]]></link>
			<title>DAY-9 Maltego</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:18:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-21-dos-ddos-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-21-dos-ddos-2/]]></link>
			<title>DAY-21 DOS &#038; DDOS</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 05:10:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-28-dos-ddos-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-28-dos-ddos-2/]]></link>
			<title>DAY-28 DOS &#038; DDOS</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 05:09:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/blog/]]></guid>
			<link><![CDATA[https://ersegment.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sun, 05 Oct 2025 07:21:26 +0000]]></pubDate>
		</item>
				</channel>
</rss>
