<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 11, 2026 at 11:53 am by All in One SEO v4.9.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://ersegment.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>E R Segment</title>
		<link><![CDATA[https://ersegment.com]]></link>
		<description><![CDATA[E R Segment]]></description>
		<lastBuildDate><![CDATA[Sat, 11 Apr 2026 06:22:28 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://ersegment.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-14-csrf-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-14-csrf-2/]]></link>
			<title>DAY-14 CSRF</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 06:22:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-14-csrf/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-14-csrf/]]></link>
			<title>DAY-14 CSRF</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 06:21:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-10-network-reporting/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-10-network-reporting/]]></link>
			<title>DAY-10 Network Reporting</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 06:06:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-19-snmp-enumeration/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-19-snmp-enumeration/]]></link>
			<title>DAY-19 SNMP Enumeration</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 05:51:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-30-honeypots/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-30-honeypots/]]></link>
			<title>DAY-30 Honeypots</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 05:04:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-37-honeypots/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-37-honeypots/]]></link>
			<title>DAY-37 Honeypots</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 05:03:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-1-introduction-to-ethical-hacking-cia-triad/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-1-introduction-to-ethical-hacking-cia-triad/]]></link>
			<title>DAY-1 Introduction to Ethical Hacking &#038;&#038; CIA Triad</title>
			<pubDate><![CDATA[Sat, 11 Apr 2026 04:48:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-36-snort-installation/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-36-snort-installation/]]></link>
			<title>DAY-36 Snort Installation</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 05:45:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-35-ids-ips/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-35-ids-ips/]]></link>
			<title>DAY-35 IDS &#038;&#038; IPS</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:57:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-29-snort-installation-3/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-29-snort-installation-3/]]></link>
			<title>DAY-29 Snort Installation</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 05:43:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-28-ids-ips-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-28-ids-ips-2/]]></link>
			<title>DAY-28 IDS &#038;&#038; IPS</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:57:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-14-linux-commands-part-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-14-linux-commands-part-2/]]></link>
			<title>DAY-14 Linux Commands part-2</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:54:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-13-security-misconfig-sensitive-data-exposure-missing-funtional-level-access-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-13-security-misconfig-sensitive-data-exposure-missing-funtional-level-access-2/]]></link>
			<title>DAY-13 Security misconfig, Sensitive data exposure &#038; Missing funtional level access</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:26:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-13-security-misconfig-sensitive-data-exposure-missing-funtional-level-access/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-13-security-misconfig-sensitive-data-exposure-missing-funtional-level-access/]]></link>
			<title>DAY-13 Security misconfig, Sensitive data exposure &#038; Missing funtional level access</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:26:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-12-file-upload-file-inclusions-lab-part-2-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-12-file-upload-file-inclusions-lab-part-2-2/]]></link>
			<title>DAY-12 File Upload &#038;&#038; File Inclusions Lab Part-2</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:23:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-12-file-upload-file-inclusions-lab-part-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-12-file-upload-file-inclusions-lab-part-2/]]></link>
			<title>DAY-12 File Upload &#038;&#038; File Inclusions Lab Part-2</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:23:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-18-enumeration/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-18-enumeration/]]></link>
			<title>DAY-18 Enumeration</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:42:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/about-us/]]></guid>
			<link><![CDATA[https://ersegment.com/about-us/]]></link>
			<title>About Us</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:51:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/internship-program/]]></guid>
			<link><![CDATA[https://ersegment.com/internship-program/]]></link>
			<title>Internship Program</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:50:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-17-vulnerability-exploitation-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-17-vulnerability-exploitation-2/]]></link>
			<title>DAY-17 Vulnerability Exploitation</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 17:53:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-11-file-upload-file-inclusions-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-11-file-upload-file-inclusions-2/]]></link>
			<title>DAY-11 File Upload &#038;&#038; File Inclusions</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:15:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-11-file-upload-file-inclusions/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-11-file-upload-file-inclusions/]]></link>
			<title>DAY-11 File Upload &#038;&#038; File Inclusions</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:14:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-10-automated-tool-xss-idor/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-10-automated-tool-xss-idor/]]></link>
			<title>DAY-10 Automated tool XSS &#038;&#038; IDOR</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:09:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-10-automated-tool-xss-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-10-automated-tool-xss-2/]]></link>
			<title>DAY-10 Automated tool XSS</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 05:03:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/]]></guid>
			<link><![CDATA[https://ersegment.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:49:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-9-network-traffic-analysis-day-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-9-network-traffic-analysis-day-2/]]></link>
			<title>DAY-9 Network Traffic Analysis Day-2</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:53:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-16-nmap-script-enginense/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-16-nmap-script-enginense/]]></link>
			<title>DAY-16 Nmap Script Engine(NSE)</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:30:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-34-firewall-its-types/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-34-firewall-its-types/]]></link>
			<title>DAY-34 Firewall &#038;&#038; It&#8217;s Types</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:26:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-27-firewall-its-types/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-27-firewall-its-types/]]></link>
			<title>DAY-27 Firewall &#038;&#038; It&#8217;s Types</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:26:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-8-network-traffic-analysis-1/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/soc-2026-feb/lesson/day-8-network-traffic-analysis-1/]]></link>
			<title>DAY-8 Network Traffic Analysis-1</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 11:35:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-13-linux-commands/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-13-linux-commands/]]></link>
			<title>DAY-13 Linux Commands</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:26:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-15-timing-performance-scan/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-15-timing-performance-scan/]]></link>
			<title>DAY-15 Timing &#038;&#038; Performance Scan</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:16:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-32-social-engineering/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-32-social-engineering/]]></link>
			<title>DAY-32 Social Engineering</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 17:02:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-8-cross-site-scripting-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-8-cross-site-scripting-2/]]></link>
			<title>DAY-8 Cross site scripting</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 09:03:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-7-broken-auth-otp-bypassing-and-session-management-part-2-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-7-broken-auth-otp-bypassing-and-session-management-part-2-2/]]></link>
			<title>DAY-7 Broken Auth (OTP Bypassing and Session Management) Part-2</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 09:03:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-13-port-scanning-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-13-port-scanning-2/]]></link>
			<title>DAY-13 Port Scanning</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:35:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-9-cross-site-scripting-part-2-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-54/lesson/day-9-cross-site-scripting-part-2-2/]]></link>
			<title>DAY-9 Cross site scripting Part-2</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 09:02:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-12-hypervisors/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-12-hypervisors/]]></link>
			<title>DAY-12 Hypervisors</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 11:22:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-14-open-vpn-setup/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-57/lesson/day-14-open-vpn-setup/]]></link>
			<title>DAY-14 Open VPN Setup</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:40:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-8-cross-site-scripting/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-8-cross-site-scripting/]]></link>
			<title>DAY-8 Cross site scripting</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:37:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-26-social-engineering-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-26-social-engineering-2/]]></link>
			<title>DAY-26 Social Engineering -2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:04:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-33-social-engineering-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-55/lesson/day-33-social-engineering-2/]]></link>
			<title>DAY-33 Social Engineering -2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:01:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-11-dns/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-11-dns/]]></link>
			<title>DAY-11 DNS</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 05:21:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-25-social-engineering/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-56/lesson/day-25-social-engineering/]]></link>
			<title>DAY-25 Social Engineering</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 17:02:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-9-cross-site-scripting-part-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/web-penetration-testing-batch-54/lesson/day-9-cross-site-scripting-part-2/]]></link>
			<title>DAY-9 Cross site scripting Part-2</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 09:02:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-10-os-architecture/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-10-os-architecture/]]></link>
			<title>DAY-10 OS Architecture</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:08:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-9-osi-model/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-9-osi-model/]]></link>
			<title>DAY-9 OSI Model</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:04:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-8-mac-address/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-8-mac-address/]]></link>
			<title>DAY-8 MAC Address</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:02:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-7-dhcp-2/]]></guid>
			<link><![CDATA[https://ersegment.com/courses/cybersecurity-batch-58/lesson/day-7-dhcp-2/]]></link>
			<title>DAY-7 DHCP</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 13:58:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ersegment.com/blog/]]></guid>
			<link><![CDATA[https://ersegment.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sun, 05 Oct 2025 07:21:26 +0000]]></pubDate>
		</item>
				</channel>
</rss>
