<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" generatedBy="WIX">
<url>
<loc>https://www.syniops.co.uk/category/ec-council</loc>
<lastmod>2026-03-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/745a99_bc00f3e3ecdc482b9bb2d3fe5c7aa88b~mv2.png/v1/fit/w_793,h_181,q_90/file.png</image:loc>
</image:image>
</url>
<url>
<loc>https://www.syniops.co.uk/category/fundamentals</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/network-security</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/incident-handling</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/all-products</loc>
<lastmod>2026-03-29</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/11062b_e05c5f25def24ac3b773b8e1f662ef36~mv2.jpg/v1/fit/w_5000,h_3078,q_90/file.jpg</image:loc>
</image:image>
</url>
<url>
<loc>https://www.syniops.co.uk/category/pen-testing</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/ethical-hacking</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/computer-forensics</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/cloud-security</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/disaster-recovery</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/executive-management</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/untitled-ai</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/application-security</loc>
<lastmod>2026-03-29</lastmod>
</url>
<url>
<loc>https://www.syniops.co.uk/category/encryption</loc>
<lastmod>2026-03-29</lastmod>
</url>
</urlset>