<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//rutaciber.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://rutaciber.com/sfp-dmarc-dkim-configuracion-de-correo/</loc>
		<lastmod>2026-04-08T05:52:00+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/spf-dkim-dmarc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/image-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/principio-de-minimo-privilegio/</loc>
		<lastmod>2026-04-01T07:55:04+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/principio-de-minimo-privilegio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/comando-dig-en-ciberseguridad/</loc>
		<lastmod>2026-03-31T19:16:30+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/comando-dig-osint-dns.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/dig-utilidad-por-consola.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/hardening-wordpress-fundamentos-basicos/</loc>
		<lastmod>2026-03-31T10:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/hardening-wordpress-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/ransomware-tu-peor-pesadilla-digital/</loc>
		<lastmod>2026-03-31T10:10:17+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/ransomware-v3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/triada-cia-o-pentagono-de-la-ciberseguridad/</loc>
		<lastmod>2026-03-31T10:09:45+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/pentagono-de-la-ciberseguridad.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/7zip-integrity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/guia-de-continuidad-de-negocio/</loc>
		<lastmod>2026-03-31T10:08:48+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/guia-continuidad-del-negocio.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/bcp-plan-de-continuidad-de-negocio-guia/</loc>
		<lastmod>2026-03-31T10:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/plan-de-continuidad-de-negocio-BCP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/plan-de-recuperacion-ante-desastres-prd/</loc>
		<lastmod>2026-03-31T10:08:04+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/plan-de-recuperacion-de-desastres-DRP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/plan-de-respuesta-a-incidentes-irp/</loc>
		<lastmod>2026-03-31T10:07:20+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/plan-de-respuesta-a-incidentes-IRP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/criptografia-en-ciberseguridad-fundamentos/</loc>
		<lastmod>2026-03-31T10:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/criptografia-fundamentos.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/guia-rgpd-que-regula-que-no/</loc>
		<lastmod>2026-03-31T10:06:42+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/rgpd-guia-fundamental.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/mejores-criterios-para-contrasenas-passwords-seguras/</loc>
		<lastmod>2026-03-28T06:57:09+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/contrasenas-mejores-criterios.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/contrasenas-nuevas-recomendaciones.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/guia-general-de-backups-estrategias-y-criterios-para-tus-copias-de-seguridad/</loc>
		<lastmod>2026-03-27T14:53:28+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/backups-copias-de-seguridad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/criptografia-simetrica-guia-inicial/</loc>
		<lastmod>2026-03-27T14:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/criptografia-simetrica-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/modelo-de-responsabilidad-compartida/</loc>
		<lastmod>2026-03-27T11:53:12+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/modelo-de-responsabilidad-compartida.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/modelos-cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/firewalls-que-realmente-protegen/</loc>
		<lastmod>2026-03-27T11:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/firewalls-seguridad-perimetral.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/seguridad-de-aplicaciones-web-bases/</loc>
		<lastmod>2026-03-27T11:50:40+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/seguridad-de-aplicaciones-web.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/app-sec.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/cabeceras-http-de-seguridad/</loc>
		<lastmod>2026-03-24T20:42:16+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/cabeceras-http-de-seguridad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/gestor-de-contrasenas-protege-tus-datos/</loc>
		<lastmod>2026-03-24T19:34:01+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/gestores-de-contrasenas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/phising-eslabon-humano-vulnerable/</loc>
		<lastmod>2026-03-24T19:30:32+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/phising-v3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/honeypots-honeynets-honeytokens-honeyfiles/</loc>
		<lastmod>2026-03-24T15:32:50+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/honeypots-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/inventario-de-activos-como-protegerlos/</loc>
		<lastmod>2026-03-23T12:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/inventario-de-activos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/inventario-de-activos-shadow-IT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/shadow-it-detectar-y-controlar/</loc>
		<lastmod>2026-03-23T11:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/shadowIT-featured.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/shadowIT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/amenazas-de-ia-el-lado-oscuro-de-la-ciberseguridad/</loc>
		<lastmod>2026-03-15T19:33:49+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/amenazas-IA-ciberseguridad.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/man-in-the-middle-la-amenaza-del-hombre-en-el-medio/</loc>
		<lastmod>2026-03-15T19:31:59+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/man-in-the-middle.v3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/anonimizacion-ofuscacion-de-datos/</loc>
		<lastmod>2026-03-12T09:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/anonimizacion-de-datos-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/firmas-digitales-tu-garabato-no-sirve-de-nada/</loc>
		<lastmod>2026-03-12T09:18:06+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/firmas-digitales-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/digital_signature_796.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/hashing-guia-definitiva/</loc>
		<lastmod>2026-03-12T09:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/hashing-la-guia-definitiva.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/gestion-de-vulnerabilidades-guia-general/</loc>
		<lastmod>2026-03-12T09:04:48+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/gestion-de-vulnerabilidades.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/escaner-de-vulnerabilidades.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/priorizacion-de-vulnerabilidades-mas-alla-del-cvss/</loc>
		<lastmod>2026-03-12T08:37:38+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/priorizacion-de-vulnerabilidades.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/priorizar-vulnerabilidades-segun-riesgo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/pki-public-key-infraestructure/</loc>
		<lastmod>2026-03-11T19:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/pki-infraestructura-de-clave-publica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/cross-site-scripting-xss-guia/</loc>
		<lastmod>2026-03-10T20:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/xss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/cierra-la-puerta-con-ssh-keys/</loc>
		<lastmod>2026-03-09T17:40:53+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/hardening-ssh-secure-shell.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/criptografia-asimetrica-fundamentos/</loc>
		<lastmod>2026-03-09T17:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/criptografia-asimetrica.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/modelo-osi-aplicado-protege-cada-capa/</loc>
		<lastmod>2026-03-09T17:26:46+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/OSI-Model.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/OSI-vs-TCPIP.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/mfa-autenticacion-multifactor/</loc>
		<lastmod>2026-03-04T13:57:37+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/MFA-autenticacion-multi-factor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/MFA-TOTP-flow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/sso-single-sign-on-ventajas-y-riesgos-de-seguridad/</loc>
		<lastmod>2026-03-04T13:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/sso-single-sign-on-v2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/single-sing-on-basic-flow-diagram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/vpns-a-fondo-tuberias-seguras/</loc>
		<lastmod>2026-02-22T07:47:30+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/vpns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://rutaciber.com/guia-maestra-de-proxies/</loc>
		<lastmod>2026-02-22T07:42:08+00:00</lastmod>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/proxy-de-red.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/forward-proxy-o.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://rutaciber.com/wp-content/uploads/reverse-proxy-o.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->