<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.dev.stratacyberintelligence.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/</loc>
		<lastmod>2026-05-14T07:58:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/strata-cyber-security-padlock-on-laptop_slider.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-icon-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-icon-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-icon-36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-icon-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-04-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-protection-firewall-interface-concept.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cybersecurity-concept-collage-design.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/pexels-saksham-choudhary-109710-2036656.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/government.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/social-enterprise.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/university.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/scholarship.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/organ-donation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/our-services-Reporting-Recommendations.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/TRAINING-AWARENESS-strata-cyber.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/data-breach-strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/strata-cyber-security-Blog2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-protection-firewall-interface-concept.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/privacy-policy-2/</loc>
		<lastmod>2026-05-11T09:48:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/terms-conditions/</loc>
		<lastmod>2026-05-11T09:52:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/about-strata-cyber-intelligence/</loc>
		<lastmod>2026-05-13T05:14:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Our-Approach-strata-Cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/number-one.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/number-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/our-services-Reporting-Recommendations.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/number-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/number-four.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/government.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/social-enterprise.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/university.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/scholarship.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/organ-donation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/cyber-security-services/</loc>
		<lastmod>2026-05-13T09:55:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-04-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/biometric-technology-background-with-fingerprint-scanning-system-virtual-screen-digital-remix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/TRAINING-AWARENESS-cyber-strata.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/find.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/ethical-hacking.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/forensics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/network-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/api.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/application.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Cyber-Security-Service-Offerings-one-strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/government.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/social-enterprise.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/settings.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/university.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/scholarship.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/organ-donation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Cyber-Risk-Management-strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-reporting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/vulnerability-assessment-penetration-testing/</loc>
		<lastmod>2026-05-13T09:56:02+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/TRAINING-AWARENESS-strata-cyber.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/automated-scanning-Strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/REPORTING-DELIVERABLES-Strata-cyber-security2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/ethical-hacking-services/</loc>
		<lastmod>2026-05-13T12:15:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-08-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/What-is-Ethical-Hacking-strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Ethical-hacking-strata-cyber-security-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-reporting.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/digital-forensics-services/</loc>
		<lastmod>2026-05-14T07:33:07+00:00</lastmod>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/cyber-security-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Digital-Forensics-Services-strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/investigation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/spam-email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/hdd.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/native.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/antivirus.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Our-Digital-Forensics-Methodology-strata-cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://www.dev.stratacyberintelligence.com/wp-content/uploads/2026/05/Digital-Forensics-reporting-strata-cyber-security-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.dev.stratacyberintelligence.com/contact-us/</loc>
		<lastmod>2026-05-14T09:23:00+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->