<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//new.mca-academy.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://new.mca-academy.com/virtual-bootcamp-fondamentaux-du-hacking-ethique/</loc>
		<lastmod>2026-02-19T11:49:11+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Les-fondamentaux-du-hacking-ethique.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/evaluez-la-securite-dune-application-web-pentest-web/</loc>
		<lastmod>2026-02-19T11:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/PentestWebEvaluezlasecuriteduneapplicationweb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/comprendre-la-cybersecurite/</loc>
		<lastmod>2026-02-19T11:56:32+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/cybersecuriteMCAACADEMY.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/comprenez-les-ransomwares-et-protegez-votre-entreprise-mca-academy/</loc>
		<lastmod>2026-02-19T11:59:55+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/ComprendrelesransomwaresMCAACADEMY.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/maitrisez-les-attaques-sur-les-environnements-active-directory-mca-academy/</loc>
		<lastmod>2026-02-19T12:02:01+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/MaitrisezlesattaquessurlesenvironnementsAD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/guide-de-reconversion-en-cybersecurite-devenez-un-expert-en-securite-informatique-mca-academy/</loc>
		<lastmod>2026-02-19T12:04:11+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/FaireunereconversionencybersecuriteavecMCAACADEMY.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/quest-ce-quune-attaque-server-side-request-forgery-ssrf-mca-academy/</loc>
		<lastmod>2026-02-19T12:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Quest-ce-quune-attaque-Server-Side-Request-Forgery-SSRF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/quest-ce-que-le-test-dintrusion-dingenierie-sociale-et-comment-le-realiser-mca-academy/</loc>
		<lastmod>2026-02-19T12:16:20+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Test-dintrusion-dingenierie-sociale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/pecb-signe-un-accord-de-partenariat-avec-myah-it-company-mca-academy/</loc>
		<lastmod>2026-02-19T12:17:10+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/brand-asset-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/myah-it-company-devient-partenaire-certifie-de-comptia-mca-academy/</loc>
		<lastmod>2026-02-19T12:19:07+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Partenariat-MYAH-IT-COMPANY-et-CompTia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/les-avantages-dune-certification-en-cybersecurite-mca-academy/</loc>
		<lastmod>2026-02-19T12:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Les-certifications-en-cybersecurite.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/partenariat-entre-mca-academy-emes-sarl-mca-academy/</loc>
		<lastmod>2026-02-19T12:32:38+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Partenariat-EMES-SARL-et-MCA-ACADEMY.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/meilleures-pratiques-pour-reussir-votre-mission-de-pentest-web-mca-academy/</loc>
		<lastmod>2026-02-19T13:10:36+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Methodologie-de-pentest-web-WAPT-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/maitriser-lart-de-la-prise-de-notes-en-cybersecurite-mca-academy/</loc>
		<lastmod>2026-02-19T13:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/La-prise-de-note-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Prise-de-note-sur-papier-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Prise-de-note-sur-support-digital-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/05-erreurs-a-eviter-pour-le-developpement-securise-des-applications-web-mca-academy/</loc>
		<lastmod>2026-02-19T13:35:54+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Image-en-avant-5-eurreurs-a-eviter-pour-le-developpement-securise-des-applications.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/developpement-securise-des-applications-web-strategies-et-bonnes-pratiques-avancees-mca-academy/</loc>
		<lastmod>2026-02-19T13:48:05+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Image-les-erreurs-courantes.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/devenez-mca-ambassador-inspirez-formez-securisez-mca-academy/</loc>
		<lastmod>2026-02-19T13:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Affiche-dappel-a-candidature-de-MCA-AMBASSADOR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/mca-academy-dar-blockchain-partenariat-de-formation-web-3-0-certifiante/</loc>
		<lastmod>2026-02-19T14:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Partenariat-MCA-ACADEMY-DAR-BLOCKCHAIN.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/10-erreurs-courantes-dans-la-configuration-dactive-directory-et-comment-les-eviter-mca-academy/</loc>
		<lastmod>2026-02-19T14:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Image-pour-la-configuration-active-directory.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/les-erreurs-de-configuration-qui-exposent-vos-applications-mca-academy/</loc>
		<lastmod>2026-02-19T14:20:07+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Visuel-sur-les-erreurs-des-configurations-des-apps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/comment-mettre-en-place-un-smsi-mca-academy/</loc>
		<lastmod>2026-02-19T14:24:23+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Visuel-sur-la-mise-en-place-dun-smsi.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/changer-de-carriere-pour-la-cybersecurite-une-opportunite-davenir-mca-academy/</loc>
		<lastmod>2026-02-19T14:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Banniere-article-de-reconversion-en-cybersecurite.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/02/Groupe-detudiant-en-train-de-manipuler-leurs-pc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/owasp-top-10-2025/</loc>
		<lastmod>2026-03-13T10:53:50+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1764351958852.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/avant-de-hacker-le-monde-certifie-toi/</loc>
		<lastmod>2026-03-13T10:54:58+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1763115622908.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/software-supply-chain-failures/</loc>
		<lastmod>2026-03-13T10:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1770368647014.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/react2shell-votre-app-next-js-est-elle-en-securite-etude-de-cas/</loc>
		<lastmod>2026-03-13T11:10:44+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1771581145587.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/comprendre-le-parcours-analyste-cyberdefense/</loc>
		<lastmod>2026-03-27T11:39:01+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/Frame-107-1-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/5-femmes-dans-le-monde-qui-ont-change-lhistoire-du-numerique/</loc>
		<lastmod>2026-03-27T11:47:06+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1772807671540-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-13.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-14.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/oscp-vs-pnpt-vs-comptia-pentest-quelle-certification-choisir-selon-votre-profil/</loc>
		<lastmod>2026-03-27T11:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1772205490733.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/image-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/pentest-mobile-mca-academy/</loc>
		<lastmod>2026-03-27T11:55:19+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/WhatsApp-Image-2026-03-27-at-12.41.48-PM.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://new.mca-academy.com/debuter-en-cybersecurite-sans-backgroud-en-informatique-mythe-ou-realite/</loc>
		<lastmod>2026-03-27T11:59:06+00:00</lastmod>
		<image:image>
			<image:loc>https://new.mca-academy.com/wp-content/uploads/2026/03/1770920204848.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->