<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was 動態地 generated on 2026-04-18 at 上午 3:25 by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://ainetwork-training.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>AI Network-全智網科技-資安及網路課程專家</title>
		<link><![CDATA[https://ainetwork-training.com]]></link>
		<description><![CDATA[AI Network-全智網科技-資安及網路課程專家]]></description>
		<lastBuildDate><![CDATA[Thu, 16 Apr 2026 08:24:08 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://ainetwork-training.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://ainetwork-training.com/cisco/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/cisco/]]></link>
			<title>Cisco 全系列課程</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:24:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/product/cissp/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/product/cissp/]]></link>
			<title>CISSP 資安系統專家認證 – 另加贈 2天總複習班</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:12:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/cissp/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/cissp/]]></link>
			<title>CISSP 資安系統專家認證 – 另加贈 2天總複習班</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 08:07:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/cciebootcamp/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/cciebootcamp/]]></link>
			<title>CCIE EI Bootcamp / CCIE EI 衝刺營</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 06:27:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/data/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/data/]]></link>
			<title>CompTIA Data+ 數據分析師認證課程 &#8211; Certified Data Analyst</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 03:09:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/product/data/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/product/data/]]></link>
			<title>CompTIA Data+ 數據分析師認證課程 &#8211; Certified Data Analyst</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 03:09:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/]]></link>
			<title>CompTIA SecAI+ 國際AI資安認證課程</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 03:05:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/product/secai/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/product/secai/]]></link>
			<title>CompTIA SecAI+ 國際AI資安認證課程</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 03:05:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/6-3-解釋合規性對-ai-業務使用與開發的影響（explain-the-impact-of-compliance-on-bus/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/6-3-解釋合規性對-ai-業務使用與開發的影響（explain-the-impact-of-compliance-on-bus/]]></link>
			<title>6.3 解釋合規性對 AI 業務使用與開發的影響（Explain the Impact of Compliance on Business Use and Development of AI）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/6-2-定義與-ai-相關的風險（define-the-risks-associated-with-ai）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/6-2-定義與-ai-相關的風險（define-the-risks-associated-with-ai）/]]></link>
			<title>6.2 定義與 AI 相關的風險（Define the Risks Associated with AI）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/6-1-分類-ai-的組織治理結構（classify-organizational-governance-structures-for-ai）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/6-1-分類-ai-的組織治理結構（classify-organizational-governance-structures-for-ai）/]]></link>
			<title>6.1 分類 AI 的組織治理結構（Classify Organizational Governance Structures for AI）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/5-3-使用-ai-使安全任務自動化（use-ai-to-automate-security-tasks）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/5-3-使用-ai-使安全任務自動化（use-ai-to-automate-security-tasks）/]]></link>
			<title>5.3 使用 AI 使安全任務自動化（Use AI to Automate Security Tasks）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/5-2-總結-ai-支援與-ai-增強的攻擊向量（summarize-ai-enabled-and-ai-enhanced-attack-vectors）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/5-2-總結-ai-支援與-ai-增強的攻擊向量（summarize-ai-enabled-and-ai-enhanced-attack-vectors）/]]></link>
			<title>5.2 總結 AI 支援與 AI 增強的攻擊向量（Summarize AI-Enabled and AI-Enhanced Attack Vectors）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/5-1-使用支援-ai-的工具執行安全任務（use-ai-enabled-tools-for-security-tasks）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/5-1-使用支援-ai-的工具執行安全任務（use-ai-enabled-tools-for-security-tasks）/]]></link>
			<title>5.1 使用支援 AI 的工具執行安全任務（Use AI-Enabled Tools for Security Tasks）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:55:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/4-2-分析-ai-系統攻擊並利用補償性控制（analyze-ai-system-attacks-and-utilize-compensating-contro/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/4-2-分析-ai-系統攻擊並利用補償性控制（analyze-ai-system-attacks-and-utilize-compensating-contro/]]></link>
			<title>4.2 分析 AI 系統攻擊並利用補償性控制（Analyze AI System Attacks and Utilize Compensating Controls）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/4-1-證明-ai-生命週期中安全性的重要性（demonstrate-the-importance-of-security-in-the-ai-life-cyc/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/4-1-證明-ai-生命週期中安全性的重要性（demonstrate-the-importance-of-security-in-the-ai-life-cyc/]]></link>
			<title>4.1 證明 AI 生命週期中安全性的重要性（Demonstrate the Importance of Security in the AI Life Cycle）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/3-3-執行-ai-系統的監控與稽核（perform-monitoring-and-auditing-for-ai-systems）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/3-3-執行-ai-系統的監控與稽核（perform-monitoring-and-auditing-for-ai-systems）/]]></link>
			<title>3.3 執行 AI 系統的監控與稽核（Perform Monitoring and Auditing for AI Systems）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/3-2-應用-ai-安全的資料安全控制（apply-data-security-controls-for-ai-security）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/3-2-應用-ai-安全的資料安全控制（apply-data-security-controls-for-ai-security）/]]></link>
			<title>3.2 應用 AI 安全的資料安全控制（Apply Data Security Controls for AI Security）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/3-1-部署-ai-的存取控制（deploy-access-controls-for-ai）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/3-1-部署-ai-的存取控制（deploy-access-controls-for-ai）/]]></link>
			<title>3.1 部署 AI 的存取控制（Deploy Access Controls for AI）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/2-2-實施-ai-系統的安全控制（implement-security-controls-for-ai-systems）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/2-2-實施-ai-系統的安全控制（implement-security-controls-for-ai-systems）/]]></link>
			<title>2.2 實施 AI 系統的安全控制（Implement Security Controls for AI Systems）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/2-1-使用-ai-威脅建模（use-ai-threat-modeling）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/2-1-使用-ai-威脅建模（use-ai-threat-modeling）/]]></link>
			<title>2.1 使用 AI 威脅建模（Use AI Threat Modeling）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:54:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/1-3-保護-ai-資料（secure-ai-data）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/1-3-保護-ai-資料（secure-ai-data）/]]></link>
			<title>1.3 保護 AI 資料（Secure AI Data）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:53:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/1-2-了解-ai-模型訓練與提示工程（understand-ai-model-training-and-prompt-engineering）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/1-2-了解-ai-模型訓練與提示工程（understand-ai-model-training-and-prompt-engineering）/]]></link>
			<title>1.2 了解 AI 模型訓練與提示工程（Understand AI Model Training and Prompt Engineering）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:53:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/1-1-解釋網路安全的-ai-概念（explain-ai-concepts-for-cybersecurity）/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/1-1-解釋網路安全的-ai-概念（explain-ai-concepts-for-cybersecurity）/]]></link>
			<title>1.1 解釋網路安全的 AI 概念（Explain AI Concepts for Cybersecurity）</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:53:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻擊摘要與管理語言轉換-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻擊摘要與管理語言轉換-2/]]></link>
			<title>攻擊摘要與管理語言轉換</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻擊行為模擬示範-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻擊行為模擬示範-2/]]></link>
			<title>攻擊行為模擬示範</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ai-輔助解讀攻擊目的與流程-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ai-輔助解讀攻擊目的與流程-2/]]></link>
			<title>AI 輔助解讀攻擊目的與流程</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/自動產出攻擊摘要說明-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/自動產出攻擊摘要說明-2/]]></link>
			<title>自動產出攻擊摘要說明</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ai-輔助攻擊分析流程-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ai-輔助攻擊分析流程-2/]]></link>
			<title>AI 輔助攻擊分析流程</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/管理層攻擊摘要報告草稿-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/管理層攻擊摘要報告草稿-2/]]></link>
			<title>管理層攻擊摘要報告草稿</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/incident-response-標準流程：通報、隔離、調查、修補、回顧-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/incident-response-標準流程：通報、隔離、調查、修補、回顧-2/]]></link>
			<title>Incident Response 標準流程：通報、隔離、調查、修補、回顧</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/soc-it-管理層角色分工-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/soc-it-管理層角色分工-2/]]></link>
			<title>SOC / IT / 管理層角色分工</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ir-runbook-設計原則-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ir-runbook-設計原則-2/]]></link>
			<title>IR Runbook 設計原則</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/端到端事件回應演練-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/端到端事件回應演練-2/]]></link>
			<title>端到端事件回應演練</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/受害端點隔離示範-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/受害端點隔離示範-2/]]></link>
			<title>受害端點隔離示範</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ai-輔助產出完整事件分析與改善建議-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/ai-輔助產出完整事件分析與改善建議-2/]]></link>
			<title>AI 輔助產出完整事件分析與改善建議</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/完整《攻防演練成果報告》-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/完整《攻防演練成果報告》-2/]]></link>
			<title>完整《攻防演練成果報告》</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻防成熟度評估與改善-roadmap-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻防成熟度評估與改善-roadmap-2/]]></link>
			<title>攻防成熟度評估與改善 Roadmap</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/bas-與-xdr-架構與角色定位-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/bas-與-xdr-架構與角色定位-2/]]></link>
			<title>BAS 與 XDR 架構與角色定位</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/bas-在企業資安成熟度模型中的應用-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/bas-在企業資安成熟度模型中的應用-2/]]></link>
			<title>BAS 在企業資安成熟度模型中的應用</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/bas-x-xdr-x-soc-整合方式-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/bas-x-xdr-x-soc-整合方式-2/]]></link>
			<title>BAS × XDR × SOC 整合方式</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/mitre-attck-映射與分析方法-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/mitre-attck-映射與分析方法-2/]]></link>
			<title>MITRE ATT&#038;CK 映射與分析方法</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻防實驗環境建置概念-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻防實驗環境建置概念-2/]]></link>
			<title>攻防實驗環境建置概念</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻擊模擬節點-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/攻擊模擬節點-2/]]></link>
			<title>攻擊模擬節點</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/]]></link>
			<title>Home 4</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 06:13:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/xdr-siem-log-pipeline-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/xdr-siem-log-pipeline-2/]]></link>
			<title>XDR / SIEM / Log Pipeline</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/sensor-agent-佈署原則-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/sensor-agent-佈署原則-2/]]></link>
			<title>Sensor / Agent 佈署原則</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/執行-bas-預設攻擊情境-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/執行-bas-預設攻擊情境-2/]]></link>
			<title>執行 BAS 預設攻擊情境</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/courses/secai/lesson/觀察-xdr-偵測與告警行為-2/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/courses/secai/lesson/觀察-xdr-偵測與告警行為-2/]]></link>
			<title>觀察 XDR 偵測與告警行為</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ainetwork-training.com/blog/]]></guid>
			<link><![CDATA[https://ainetwork-training.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 04 Jul 2022 07:42:48 +0000]]></pubDate>
		</item>
				</channel>
</rss>
