<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/Hosting-gratuitos</loc>
    <lastmod>2025-07-01T14:27:19.091Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/RA-1/Servidores-web</loc>
    <lastmod>2025-07-01T14:27:19.091Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/consejos-busqueda-de-trabajo</loc>
    <lastmod>2025-07-01T14:27:19.111Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/devops</loc>
    <lastmod>2025-07-01T14:27:19.111Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/</loc>
    <lastmod>2025-07-01T14:27:19.111Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/1.-introduccion-a-kubernetes/1.0-introduccion-a-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/1.-introduccion-a-kubernetes/1.1-implantacion-de-aplicaciones-web-en-contenedores</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/1.-introduccion-a-kubernetes/1.2-docker</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/1.-introduccion-a-kubernetes/1.3-orquestadores-de-contenedores</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/1.-introduccion-a-kubernetes/1.4-el-proyecto-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/1.-introduccion-a-kubernetes/1.5-arquitectura-basica-de-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/10.-instalacion-de-aplicaciones-en-kubernetes-con-helm/10.0-instalacion-de-aplicaciones-en-kubernetes-con-helm</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/10.-instalacion-de-aplicaciones-en-kubernetes-con-helm/10.1-instalacion-de-helm</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/10.-instalacion-de-aplicaciones-en-kubernetes-con-helm/10.2-gestion-de-charts-y-despliegue-de-aplicaciones</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.0-instalacion-de-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.1-alternativas-para-instalacion-simple-de-k8s</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.2-introduccion-a-la-instalacion-de-minikube</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.3-instalacion-de-minikube-en-linux-con-kvm-virtualbox</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.4-instalacion-de-minikube-en-windows-+-virtualbox</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.5-instalacion-y-configuracion-de-kubectl-en-linux</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.6-instalacion-y-configuracion-de-kubectl-en-windows</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/2.-instalacion-de-kubernetes/2.7-despliegues-de-aplicaciones-en-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/3.-contenedores-en-kubernetes-pods/3.0-contenedores-en-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/3.-contenedores-en-kubernetes-pods/3.1-describiendo-un-pod</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/3.-contenedores-en-kubernetes-pods/3.2-gestionando-los-pods</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/4.-tolerancia-y-escalabilidad-replicasets/4.0-tolerancia-y-escalabilidad</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/4.-tolerancia-y-escalabilidad-replicasets/4.1-describiendo-un-replicaset</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/4.-tolerancia-y-escalabilidad-replicasets/4.2-gestionando-los-replicaset</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/5.-despliegues-deployments/5.0-deployments</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/5.-despliegues-deployments/5.1-describiendo-un-deployment</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/5.-despliegues-deployments/5.2-gestion-basica-de-un-deployment</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/5.-despliegues-deployments/5.3-actualizacion-y-desactualizacion-de-un-deployment</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/6.-acceso-a-las-aplicaciones-services/6.0-acceso-a-las-aplicaciones</loc>
    <lastmod>2025-07-01T14:27:19.115Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/6.-acceso-a-las-aplicaciones-services/6.1-describiendo-services</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/6.-acceso-a-las-aplicaciones-services/6.2-gestionando-los-services</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/6.-acceso-a-las-aplicaciones-services/6.3-servicio-dns-en-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/6.-acceso-a-las-aplicaciones-services/6.4-ingress-controller</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/6.-acceso-a-las-aplicaciones-services/6.5-ejemplo-completo-aplicacion-de-temperaturas</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/7.-despliegues-parametrizados/7.0-despliegue-parametrizados</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/7.-despliegues-parametrizados/7.1-variables-de-entorno</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/7.-despliegues-parametrizados/7.2-configmaps</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/7.-despliegues-parametrizados/7.3-secrets</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/7.-despliegues-parametrizados/7.4-ejemplo-completo-despliegue-y-acceso-a-wordpress-+-mariadb</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/8.0-almacenamiento-en-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/8.1-volumenes-en-kubernetes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/8.2-aprovisionamiento-de-volumenes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/8.3-solicitud-de-volumenes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/8.4-uso-de-volumenes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/ejemplo-1-gestion-estatica-de-volumenes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/ejemplo-2-gestion-dinamica-de-volumenes</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/8.-almacenamiento-en-kubernetes/ejemplo-3-wordpress-con-almacenamiento-persistente</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/9.-otras-cargas-de-trabajo/9.0-otras-cargas-de-trabajo</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/9.-otras-cargas-de-trabajo/9.1-statefulsets</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/9.-otras-cargas-de-trabajo/9.2-daemonsets</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/9.-otras-cargas-de-trabajo/9.3-jobs-y-cronjobs</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/9.-otras-cargas-de-trabajo/ejemplo-despliegue-de-un-cluster-con-mysql</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/kubernetes/</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Despliegue-de-aplicaciones-web/ra-criterios-contenidos-practicas</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/1--Introducci%C3%B3n-a-la-Orientaci%C3%B3n-a-Objetos</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/1--M%C3%A1s-ejercicios-orientaci%C3%B3n-a-objetos</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/2--Dise%C3%B1o-de-clases</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/2--M%C3%A1s-ejercicios-dise%C3%B1o-de-clases</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/3--Asociaciones-y-herencia</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/4--Interfaces</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/Ejemplo-examen</loc>
    <lastmod>2025-07-01T14:27:19.119Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/Soluciones/Soluciones-bolet%C3%ADn-1</loc>
    <lastmod>2025-07-01T14:27:19.127Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/Soluciones/Soluciones-bolet%C3%ADn-2</loc>
    <lastmod>2025-07-01T14:27:19.127Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/Soluciones/Soluciones-bolet%C3%ADn-3</loc>
    <lastmod>2025-07-01T14:27:19.127Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/Programaci%C3%B3n/Ejercicios-Java/Soluciones/Soluciones-bolet%C3%ADn-4</loc>
    <lastmod>2025-07-01T14:27:19.127Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/DAW/</loc>
    <lastmod>2025-07-01T14:27:19.127Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/FP-Dual/Normativa</loc>
    <lastmod>2025-07-01T14:27:19.187Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/FP-Dual/</loc>
    <lastmod>2025-07-01T14:27:19.187Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Aprendizaje-autom%C3%A1tico-aplicado-a-la-ciberseguridad</loc>
    <lastmod>2025-07-01T14:27:19.187Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Enlaces-interesantes</loc>
    <lastmod>2025-07-01T14:27:19.187Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Programaci%C3%B3n-de-Inteligencia-Artificial/Python---webs-para-aprender</loc>
    <lastmod>2025-07-01T14:27:19.251Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Programaci%C3%B3n-de-Inteligencia-Artificial/Python-ejercicios-1</loc>
    <lastmod>2025-07-01T14:27:19.251Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Programaci%C3%B3n-de-Inteligencia-Artificial/Python-ejercicios-2</loc>
    <lastmod>2025-07-01T14:27:19.251Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Programaci%C3%B3n-de-Inteligencia-Artificial/Python-librer%C3%ADas</loc>
    <lastmod>2025-07-01T14:27:19.251Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Propuesta-ejercicios-machine-learning</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/IA-y-Big-Data/Sistemas-de-aprendizaje-autom%C3%A1tico/Enlaces</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Aplicaciones-web/</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Aplicaciones-web/ra-criterios-contenidos-practicas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Redes-locales/</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Redes-locales/ra-criterios-contenidos-practicas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Seguridad-inform%C3%A1tica/</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Seguridad-inform%C3%A1tica/ra-criterios-contenidos-practicas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Servicios-en-red/</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/Servicios-en-red/ra-criterios-contenidos-practicas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/SMR/</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/about/Sobre-el-proyecto</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/about/</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/CTFs/php-reverse-shell.php</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1a---Elementos-esenciales-del-hacking-%C3%A9tico</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1b---Conceptos-%C3%A9ticos-y-legales</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1c---Alcance-y-condiciones-de-un-pentest</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1d---Principios-de-seguridad</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1e---Fases-del-hacking</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1f---An%C3%A1lisis-de-vulnerabilidades</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1g---An%C3%A1lisis-de-tipos-de-ataques</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1h---Caracterizaci%C3%B3n-de-vulnerabilidades</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-1/1i---Herramientas-de-monitorizaci%C3%B3n-y-hacking</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2a---Funcionamiento-de-las-tarjetas-de-red-inal%C3%A1mbricas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2b---Comunicaci%C3%B3n-de-redes-inal%C3%A1mbricas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2c---Captura-de-tr%C3%A1fico-de-redes-inal%C3%A1mbricas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2d---Ataques-y-exploraci%C3%B3n-de-redes-inal%C3%A1mbricas</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2e---Ataques-a-otros-sistemas-inal%C3%A1mbricos</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2f---Equipo-rojo-vs-azul</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-2/2g---Realizaci%C3%B3n-de-informes-de-auditor%C3%ADa</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-3/3a---Escaneo-pasivo-(footprinting)</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-3/3b---Escaneo-activo-(fingerprinting)</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-3/3c---Monitorizaci%C3%B3n-e-interceptaci%C3%B3n-de-tr%C3%A1fico-de-red</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-3/3d---Ataque-de-intermediario-(Man-in-the-Middle)</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-3/3e---Comprometer-sistemas-remotos</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/4a---Administraci%C3%B3n-de-sistemas-de-manera-remota</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/4b---Ataques-y-auditor%C3%ADas-de-contrase%C3%B1as</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/4c---Pivotaje-a-trav%C3%A9s-de-sistemas-comprometidos</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/4d---Instalaci%C3%B3n-de-puertas-traseras</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/C-and-C</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/README-1</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/README</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/cewl</loc>
    <lastmod>2025-07-01T14:27:19.259Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/haiti</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/hashcat</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/john-the-ripper</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/msfvenom</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-4/gu%C3%ADas/wordlistctl</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/5a---Autenticaci%C3%B3n-web</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/5b---Recolecci%C3%B3n-de-informaci%C3%B3n-web</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/5c---An%C3%A1lisis-de-interacciones-con-aplicaciones-web</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/5d---B%C3%BAsqueda-manual-de-vulnerabilidades-web</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/5e---Herramientas-de-b%C3%BAsqueda-de-vulnerabilidades-web</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/5f---Herramientas-de-explotaci%C3%B3n-de-vulnerabilidades-web</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/gu%C3%ADas/SQLMap</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/RA-5/gu%C3%ADas/hydra</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/Temario</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Hacking-%C3%A9tico/</loc>
    <lastmod>2025-07-01T14:27:19.263Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-1/1a---Principios-generales-en-materia-de-ciberseguridad</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-1/1b---Normativa-de-protecci%C3%B3n-del-puesto-del-trabajo.</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-1/1c---Plan-de-formaci%C3%B3n-y-concienciaci%C3%B3n-en-materia-de-ciberseguridad</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-1/1d---Materiales-de-formaci%C3%B3n-y-concienciaci%C3%B3n</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-1/1e---Auditor%C3%ADas-internas-de-cumplimiento-en-materia-de-prevenci%C3%B3n</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/2a---Taxonom%C3%ADa-de-incidentes-de-ciberseguridad</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/2b---Monitorizaci%C3%B3n,-identificaci%C3%B3n,-detecci%C3%B3n-y-alerta-de-incidentes</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/2c---Detecci%C3%B3n-e-identificaci%C3%B3n-de-incidentes-de-seguridad-f%C3%ADsica</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/2d---Monitorizaci%C3%B3n,-identificaci%C3%B3n,-detecci%C3%B3n-y-alerta-de-incidentes-a-trav%C3%A9s-de-OSINT</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/2e---Clasificaci%C3%B3n,-valoraci%C3%B3n,-documentaci%C3%B3n,-seguimiento-inicial-de-incidentes-de-ciberseguridad</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/Herramientas-de-un-SOC</loc>
    <lastmod>2025-07-01T14:27:19.271Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/gu%C3%ADas/Suricata</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-2/gu%C3%ADas/Wazuh</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-3/3a---Recopilaci%C3%B3n-de-evidencias</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-3/3b---An%C3%A1lisis-de-evidencias.</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-3/3c---Investigaci%C3%B3n-del-incidente</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-3/3d---Intercambio-de-informaci%C3%B3n-del-incidente-con-proveedores-u-organismos-competentes.</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-3/3e---Medidas-de-contenci%C3%B3n-de-incidentes.</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-3/gu%C3%ADas/analisis-de-logs</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-4/4a---Desarrollar-procedimientos-de-actuaci%C3%B3n-detallados-para-dar-respuesta,-mitigar,-eliminar-o-contener-los-tipos-de-incidentes</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-4/4b---Implantar-capacidades-de-ciberresiliencia</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-4/4c---Establecer-flujos-de-toma-de-decisiones-y-escalado-interno-o-externo-adecuados</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-4/4d---Tareas-para-reestablecer-los-servicios-afectados-por-incidentes</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-4/4e---Documentaci%C3%B3n</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-4/4f----Seguimiento-de-incidentes-para-evitar-una-situaci%C3%B3n-similar</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-5/5a---Desarrollar-procedimientos-de-actuaci%C3%B3n-para-la-notificaci%C3%B3n-de-incidentes</loc>
    <lastmod>2025-07-01T14:27:19.275Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-5/5b---Notificaci%C3%B3n-interna-de-incidentes</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-5/5c---Notificaci%C3%B3n-de-incidentes-a-quienes-corresponda</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-5/5d---Notificaci%C3%B3n-forma-de-incidentes-a-afectados</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/RA-5/5e---Notificaci%C3%B3n-de-incidentes-a-medios-de-comunicaci%C3%B3n</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/Temario</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Incidentes-de-ciberseguridad/</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/RA-1/Unidad-1---RA-1</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/RA-2/Unidad-2---RA-2</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/RA-3/Unidad-3---RA-3</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/RA-4/Unidad-4---RA-4</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/RA-5/Unidad-5---RA-5</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/Temario</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Normativa-de-ciberseguridad/</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/RA-1/Unidad-1---RA-1</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/RA-2/Unidad-2---RA-2</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/RA-3/Unidad-3---RA-3</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/RA-4/Unidad-4---RA-4</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/RA-5/Unidad-5---RA-5</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/Temario</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/Puesta-en-produccion-segura/</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/ceti/</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/</loc>
    <lastmod>2025-07-01T14:27:19.279Z</lastmod>
  </url></urlset>