<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//learning.mlytics.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://learning.mlytics.com/cdn/what-is-an-edge-server/</loc>
		<lastmod>2020-04-28T07:49:06+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/what-is-an-edge-server.jpg</image:loc>
			<image:caption><![CDATA[what is an edge server]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/domain-name-system/how-to-migrate-from-one-dns-provider-to-another/</loc>
		<lastmod>2021-06-04T03:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/origin-server/what-is-an-origin-server/</loc>
		<lastmod>2021-06-28T04:38:01+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/origin-server.jpg</image:loc>
			<image:caption><![CDATA[what is an origin server]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/end-user-last-mile/from-ip-address-to-domain-name/</loc>
		<lastmod>2021-06-28T06:52:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cdn/multi-cdn-vs-single-cdn/</loc>
		<lastmod>2021-07-02T12:50:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/domain-name-system/domain-name-system-dns/</loc>
		<lastmod>2021-07-13T03:38:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/domain-name-system/how-to-route-dns-traffic/</loc>
		<lastmod>2021-07-15T10:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/domain-name-system/dns-record-what-is-a-zone-file/</loc>
		<lastmod>2021-07-15T10:07:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/domain-name-system/dns-troubleshooting-tools/</loc>
		<lastmod>2021-07-15T10:18:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/origin-server/types-of-websites-and-web-contents/</loc>
		<lastmod>2021-07-22T09:06:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/http-request-methods/</loc>
		<lastmod>2021-07-28T06:25:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/http-response-status-codes/</loc>
		<lastmod>2021-07-28T06:27:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/what-is-an-internet-exchange-point-ixp/</loc>
		<lastmod>2021-08-06T07:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2020/03/exchange-point4.001.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/what-is-sql-injection/</loc>
		<lastmod>2021-08-06T07:05:05+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2020/03/injection-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/what-is-owasp-and-what-are-the-top-10-owasp-threats/</loc>
		<lastmod>2021-08-06T07:05:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/multi-cdn/what-is-a-multi-cdn/</loc>
		<lastmod>2021-08-20T08:30:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/what-is-an-api/</loc>
		<lastmod>2021-09-01T12:41:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/firewall-vs-waf/</loc>
		<lastmod>2021-09-01T12:45:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/tcp-3-way-handshake/</loc>
		<lastmod>2021-09-02T07:34:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/what-is-an-ssl-certificate/</loc>
		<lastmod>2021-09-02T08:25:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/origin-server/what-is-sni/</loc>
		<lastmod>2021-09-09T09:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/origin-server/what-are-http-headers/</loc>
		<lastmod>2021-10-05T10:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/what-is-the-osi-model/</loc>
		<lastmod>2021-10-08T08:42:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/what-is-the-tcp-ip-model/</loc>
		<lastmod>2021-10-08T08:47:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cdn/what-is-a-cdn-content-delivery-network/</loc>
		<lastmod>2021-11-04T10:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/origin-server/what-is-downtime-cloud-service/</loc>
		<lastmod>2022-03-13T13:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/domain-name-system/common-types-of-dns-records/</loc>
		<lastmod>2022-03-22T06:20:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/multi-cdn/important-considerations-before-implementing-a-multi-cdn-strategy/</loc>
		<lastmod>2023-07-20T02:21:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/what-is-hsts/</loc>
		<lastmod>2023-09-20T10:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/what-is-token-authentication/</loc>
		<lastmod>2023-09-20T10:26:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/what-is-web-application-security/</loc>
		<lastmod>2023-09-20T10:27:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/key-metrics-to-measure-with-rum/</loc>
		<lastmod>2023-09-20T10:28:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/how-to-implement-rum-for-multi-cdn-strategy/</loc>
		<lastmod>2023-09-20T10:28:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/what-is-a-phishing-attack/</loc>
		<lastmod>2023-09-20T10:29:27+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/what-is-phising-attack.png</image:loc>
			<image:caption><![CDATA[what is a phising attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/what-is-a-man-in-the-middle-attack/</loc>
		<lastmod>2023-09-20T10:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/man-in-the-middle-attack.png</image:loc>
			<image:caption><![CDATA[man in the middle attack]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cdn/what-is-application-delivery-network/</loc>
		<lastmod>2023-09-20T10:30:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/multi-cdn/how-multi-cdn-can-protect-your-website/</loc>
		<lastmod>2023-09-20T10:31:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/multi-cdn/factors-that-will-impact-your-multi-cdn-strategy/</loc>
		<lastmod>2023-09-20T10:31:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/what-is-a-web-application-firewall/</loc>
		<lastmod>2023-09-20T10:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/mitigating-a-ddos-attacks/</loc>
		<lastmod>2023-09-22T01:40:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cybersecurity/how-does-waf-work/</loc>
		<lastmod>2023-09-22T01:40:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/what-is-real-user-monitoring/</loc>
		<lastmod>2023-09-22T01:41:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/how-does-rum-work/</loc>
		<lastmod>2023-09-22T01:41:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/rum-vs-other-monitoring-tools/</loc>
		<lastmod>2023-09-22T01:42:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/why-is-rum-important-for-modern-web-applications/</loc>
		<lastmod>2023-09-22T01:43:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/web-monitoring/what-is-synthetic-user-monitoring/</loc>
		<lastmod>2023-09-22T01:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/common-threats-to-web-application/</loc>
		<lastmod>2023-09-22T01:47:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/what-is-a-ddos-attack/</loc>
		<lastmod>2023-09-22T01:49:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/types-of-ddos-attacks/</loc>
		<lastmod>2023-09-22T01:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/what-is-cross-site-request-forgery/</loc>
		<lastmod>2023-09-22T01:50:30+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/cross-site-request-forgery.png</image:loc>
			<image:caption><![CDATA[cross-site request forgery (CSRF)]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/cyber-attacks/what-is-cross-site-scripting/</loc>
		<lastmod>2023-09-22T01:50:56+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/xxs.png</image:loc>
			<image:caption><![CDATA[cross-site scripting]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://learning.mlytics.com/the-internet/what-is-web-scraping/</loc>
		<lastmod>2023-09-22T01:51:34+00:00</lastmod>
		<image:image>
			<image:loc>https://learning.mlytics.com/wp-content/uploads/2019/07/Screen-Shot-2019-07-25-at-4.46.52-PM.png</image:loc>
			<image:caption><![CDATA[what is web scraping]]></image:caption>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->