<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//lybernet.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://lybernet.com/</loc>
		<lastmod>2026-04-09T17:20:56+00:00</lastmod>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/01/shutterstock_1863780310-scaled-1-1536x1024-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/01/pexels-photo-3183150-3183150-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://lybernet.com/portfolio/</loc>
		<lastmod>2026-04-21T13:24:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/customer-cabinet/</loc>
		<lastmod>2026-04-21T11:56:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/account-login/your-profile/</loc>
		<lastmod>2026-04-21T11:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/account-login/</loc>
		<lastmod>2026-04-19T06:23:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/membership-login/</loc>
		<lastmod>2026-04-08T16:51:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/contact/</loc>
		<lastmod>2026-04-08T14:33:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/our-story/</loc>
		<lastmod>2026-04-08T14:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/e-books/</loc>
		<lastmod>2026-03-23T19:40:57+00:00</lastmod>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101bookofr-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101blackhatpython-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101blackhatgo-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Black-Hat-Python-2nd-Edition-by-Justin-Seitz-Tim-Arnold-Justin-Seitz-1-791x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Black-Hat-Bash-Early-Access-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101automatetheboringstuffwithpython_new-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101attackingnetworkprotocols_ebook-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101androidsecurityinternals-1-789x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Windows-Security-Internals-with-PowerShell-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101websecurityfordevelopers-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101thinklikeaprogrammer-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101thelinuxcommandline-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101thehardwarehacker-1-683x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101thecarhackershandbook-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101thebookoffsharp-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101The-Linux-Cookbook-Second-Edition-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101The-Art-of-Assembly-Language-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101The-Art-of-64-Bit-Assembly-Volume-1-x86-64-Machine-Organization-and-Programming-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101The-Android-Malware-Handbook-1-791x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101teachyourkidstocode_1490913058-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101socialengineering-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Silence-on-the-Wire-A-Field-Guide-to-Passive-Reconnaissance-and-Indirect-Attacks-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101seriouscrytography-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Serious-Python-Black-Belt-Advice-on-Deployment-Scalability-Testing-1-791x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101secretlifeofprograms-1-770x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101rustprogramminglanguagerust2018-1-800x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101rootkitsandbootkits-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101real-worldbughunting-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Real-World-Python-A-Hackers-Guide-to-Solving-Problems-with-Code-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101pythonplayground_geekyprojectsforthecuriousprogrammer-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101pythonforkids-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101practicalsql-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101practicalpacketanalysis-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101practicalmalwareanalysis-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Practical-Linux-Forensics-A-Guide-for-Digital-Investigators-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101practicalbinaryanalysis-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Practical-IoT-Hacking-The-Definitive-Guide-to-Attacking-the-Internet-of-Things-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101PowerShell-for-Sysadmins-Workflow-Automation-Made-Easy-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101perlone-liners-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101pentestingazure-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101penetrationtesting-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101metasploit_apenetrationtestersguide-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101malwaredatascience-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101learnjavatheeasyway-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101iOSapllicactionsecurity-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101inventyourowncomputergameswithpython-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Introduction-to-Computer-Organization-An-Under-the-Hood-Look-at-Hardware-and-x86-64-Assembly-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101informationsecurity-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101impracticalpythonprojects-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101How-to-Hack-Like-a-Legend_-Breaking-Windows-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101How-to-Hack-Like-a-Ghost-Breaching-the-Cloud-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101hardwarehacking-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Hacks-Leaks-and-Revelations-Early-Access-The-Art-of-Analyzing-Hacked-and-Leaked-Data-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101hacking_artofexploitation_2ndedition-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Hacking-VoIP-Protocols-Attacks-and-Countermeasures-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Hacking-APIs-Early-Access-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101grayhatpython-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101grayhatc-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Go-Hck-Yourself-A-Simple-Introduction-to-Cyber-Attacks-and-Defence-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101getting-started-with-fpga-1-791x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101gamehacking-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101forensic-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101EvadingEDR-1-781x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101ethicalhacking-1-791x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Effective-C-An-Introduction-to-Professional-C-Programming-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101designsecuresoftware-1-775x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Cybersecurity-for-Small-Networks-1-772x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Cyberjutsu_Cybersecurity_for_the_Modern_Ninja_Ben_McCarty_Z_Library-1-683x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101cryptodictionary-1-683x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101Cracking-Codes-with-Python-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101cpluspluscrashcourse-1-774x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/1_00101codecraft-1-775x1024.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://lybernet.com/blogs/</loc>
		<lastmod>2026-03-20T21:51:38+00:00</lastmod>
		<image:image>
			<image:loc>https://lybernet.com/wp-content/uploads/2026/03/@lybernet_hq.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://lybernet.com/study-room/</loc>
		<lastmod>2026-03-20T21:50:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/membership-checkout/</loc>
		<lastmod>2026-03-20T18:45:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/careers/</loc>
		<lastmod>2026-03-19T21:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/free-resources/</loc>
		<lastmod>2026-03-19T17:35:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/account-login/membership-orders/</loc>
		<lastmod>2026-03-19T11:12:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/membership-levels/</loc>
		<lastmod>2026-03-19T11:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/account-login/membership-cancel/</loc>
		<lastmod>2026-03-19T08:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/membership-checkout/membership-confirmation/</loc>
		<lastmod>2026-03-19T08:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/account-login/membership-billing/</loc>
		<lastmod>2026-03-19T08:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/digital-solutions/</loc>
		<lastmod>2026-02-04T13:53:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/es/</loc>
		<lastmod>2026-02-04T13:51:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/terms-conditions/</loc>
		<lastmod>2026-01-26T18:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/privacy-policy-2/</loc>
		<lastmod>2026-01-26T17:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/innovation-labs/</loc>
		<lastmod>2026-01-25T10:48:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/1644-2/</loc>
		<lastmod>2026-01-02T11:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/1642-2/</loc>
		<lastmod>2026-01-02T11:58:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://lybernet.com/services/</loc>
		<lastmod>2025-12-28T15:15:24+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->