<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//defense-numerique.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://defense-numerique.com/</loc>
		<lastmod>2024-08-23T11:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://defense-numerique.com/qu-est-ce-qu-un-vpn-a-quoi-sert-un-vpn/</loc>
		<lastmod>2019-07-19T13:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Texte-VPN.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Confiance-Poign%C3%A9e-de-main.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Points-de-connexion-monde-VPN.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Changer-adresse-sortie-VPN.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/les-3-motivations-hackers/</loc>
		<lastmod>2019-09-06T14:10:44+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Pourquoi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Ours-en-prison-otage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/miner-bitcoin.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/hacker-bot-zombie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/pirater-cerveau/</loc>
		<lastmod>2019-11-29T09:06:34+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/piratage-cerveau.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/piratage-cerveau.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/900px-The_Cognitive_Bias_Codex_French_-_John_Manoogian_III_jm3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Ashley-Madison-Pirat%C3%A9_thumb.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/Biais-cognitif-Story-telling_thumb.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/appat-du-gain.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/06/prendre-son-temps-chronom%C3%A8tre.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/protection-des-donnes-personnelles-sur-internet/</loc>
		<lastmod>2019-11-29T09:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Proteger-vie-privee-Interdiction-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Proteger-vie-privee-Interdiction.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Google-analytics-Proteger-vie-privee-Statistiques.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Proteger-vie-privee-Traces.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Proteger-vie-privee-Hotjar-suivi-de-la-souris.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Proteger-vie-privee-Pixel-Facebook.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Proteger-vie-privee-Duckduckgo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/comprendre-les-menaces-numeriques/</loc>
		<lastmod>2020-11-25T14:15:25+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/03/hacker-2371490_6401.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/03/system-3599913_6401.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/03/hacker-2371490_6401.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/03/car-key-791382_6401.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/03/learn-3653430_6401.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/choisir-un-bon-mot-de-passe/</loc>
		<lastmod>2020-12-08T07:57:33+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/09/Bon-mot-de-passe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/09/Bon-mot-de-passe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/09/Cadenas-Cl%C3%A9-unique.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/09/Chiffrement-des-donn%C3%A9es-sensibles-mot-de-passe-mauvaisee-qualit%C3%A9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/09/Association-id%C3%A9e-M%C3%A9moire-Bon-mot-de-passe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/09/cadenas-cl%C3%A9s-casiers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/analyse-des-risques-securite-informatique/</loc>
		<lastmod>2020-12-08T07:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/11/Matrice-pour-analyse-des-risques.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/11/Matrice-pour-analyse-des-risques.png?fit=1024%2C337&amp;ssl=1</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/numero-pirate-telephone/</loc>
		<lastmod>2024-08-23T10:10:02+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Telephone-filaire-Piratage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/T%C3%A9l%C3%A9phone-filaire-Piratage.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Appel-en-absence.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Message-preenregistre.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/SMS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Pirate-T%C3%A9l%C3%A9phone-Smartphone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/07/Argent.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://defense-numerique.com/choisir-antivirus-gratuit/</loc>
		<lastmod>2024-08-23T11:41:50+00:00</lastmod>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Antivirus-Scan-de-lordinateur.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Antivirus-Scan-de-lordinateur.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Ordinateur-fichiers-chiffres-virus-ransomware-640.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Ordinateur-virus-spyware-espionnage-informatique.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Empreinte-Hash-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Lentille-de-cam%C3%A9ra-de-surveillance-Analyse-comportement.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Navigateur-Browser-Tab.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Bac-%C3%A0-sable-Sandbox.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Sens-interdit.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Cadena-S%C3%A9curit%C3%A9-Mot-de-passe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Disque-dur-Sauvegade-Backup_thumb.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/compteurs-de-vitesse-performance.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Argent-Euro.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/barres-verticales_thumb.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://defense-numerique.com/wp-content/uploads/2019/04/Briques-Plexiglas.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->