<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://quartz.jzhao.xyz/Assets/Hello-World!-2024-08-22-00.48.37.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/Introduction-to-Computer-Architecture-2024-09-23-14.08.37.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/JSON-101-2025-06-04-21.44.20.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/User-input-(Scanner)-2024-08-30-00.39.07.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/User-input-(Scanner)-2024-08-30-00.46.44.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/Variables-2024-08-28-03.47.43.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/What-is-the-INTERNET-2024-09-01-01.34.12.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Assets/What-is-the-INTERNET-2024-09-01-02.01.36.excalidraw</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/01---Introduction-to-Retrieval-Augmented-Generation</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/02---Core-Components-of-a-RAG-System</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/03---The-Ingestion-Pipeline---Preparing-Your-Knowledge-Base</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/04---The-Inference-Pipeline---Answering-User-Queries</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/05---Your-First-Prototype---A-Practical-Implementation</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/06---The-Multilingual-Challenge---Sinhala-and-English</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/07---Deconstructing-Complex-PDFs</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/08---Elevating-Retrieval-Performance</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/09---Domain-Adaptation-through-Fine-Tuning</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/10---Architecting-for-Scale-and-Reliability</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/11---The-Science-of-Evaluation---Measuring-What-Matters</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/12---LLMOps-in-Practice---Managing-Cost-and-Performance</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Computer-Science/AI/RAG-101/%F0%9F%94%97-Roadmap-to-Building-a-Production-Grade-Multilingual-RAG-System-for-the-Sri-Lankan-Curriculum</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Challenges/Crypto/Baby-Time-Capsule</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Challenges/Low-Logic</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Checker</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/CodePartTwo</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Editor</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Expressway</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/GiveBack</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Loggy</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/OnlyHacks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Outbound</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Signed</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Soulmate</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/Machines/Untitled</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/HackTheBox/%F0%9F%94%97-HackTheBox-CTF</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/ASCII-Numbers</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Based</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Big-Zip</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Binhexa</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Blame-Game</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Bookmarklet</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/CanYouSee</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Collaborative-Development</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Commitment-Issues</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Cookies</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/First-Find</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Glory-of-the-garden</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Includes</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Information</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Inspect-HTML</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Inspector</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Local-Authority</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/SansAlpha</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Scan-Surprise</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Scavenger-Hunt</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Secret-of-the-Polyglot</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Special</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Super-SSH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Time-Machine</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Unminify</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Useless</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Verify</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/WebDecode</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/Where-are-the-robots</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/dont-you-love-banners</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/endianness</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/interencdec</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/runme.py</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/PicoCTF/%F0%9F%94%97-PicoGym</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/Blue</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/Decryptify</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/Epoch</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/IDE</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/Light</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/RootMe</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/Simple-CTF</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/TryHack3M-Bricks-Heist</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/CTFs/TryHackMe/W1seGuy</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/CS50's-Introduction-to-CyberSecurity/Lecture-0---Securing-Accounts</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Foundations-of-Cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Common-CyberSec-Terminology</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Core-skills-for-cybersec-professionals</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Course-1-Overview</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Google-Cybersecurity-Certificate-Overview</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Helpful-resources-and-tips</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Importance-of-CyberSecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Introduction-to-Cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/My-Path-to-CyberSecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Nikki-A-day-in-the-life-of-a-security-engineer</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Responsibilities-of-an-entry-level-cybersecurity-analyst</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Transferable-and-technical-cybersecurity-skills</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Veronica-My-path-to-working-in-cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Welcome-to-the-Google-Cybersecurity-Certificate</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/Wrap-up-Module-01</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-1/%F0%9F%94%97-Module-1-Foundations-of-Cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Attacks-in-the-digital-age</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Common-attacks-and-their-effectiveness</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Determine-the-type-of-attack</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Glossary-terms-from-module-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Introduction-to-the-eight-CISSP-security-domains-Part-1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Introduction-to-the-eight-CISSP-security-domains-Part-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Keep-Your-Cool-during-a-data-breach</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Past-CyberSecurity-Attacks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Understand-attackers</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Welcome-to-module-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/Wrap-up-Module-02</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-2/%F0%9F%94%97-Module-2-Foundations-of-Cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Controls,-frameworks,-and-compliance</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Ethical-concepts-that-guide-cybersecurity-decisions</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Ethics-in-Cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Glossary-terms-from-module-3</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Heather-Protect-sensitive-data-and-information</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Holly-The-importance-of-ethics-as-a-cybersecurity-professional</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Introduction-to-security-frameworks-and-controls</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Secure-Design</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/Welcome-to-module-3</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/1---Foundations-of-Cybersecurity/Module-3/%F0%9F%94%97-Module-3-Foundations-of-Cybersecurity</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/Google-Cybersecurity-Professional-Certificate/%F0%9F%94%97-Google-Cybersecurity-Professional-Certificate</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Introduction-to-Active-Directory/Active-Directory-Research-Over-the-Years</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Introduction-to-Active-Directory/Active-Directory-Structure</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Introduction-to-Active-Directory/Kerberos-Authentication</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Introduction-to-Active-Directory/Why-Active-Directory</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Introduction-to-Active-Directory/%F0%9F%94%97-Introduction-to-Active-Directory</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Learning-Process/Ways-of-Thinking</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/Learning-Process/%F0%9F%94%97-Learning-Process</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/HTB-Academy/%F0%9F%94%97-HTB-Academy</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Advent-of-Cyber-2024-%E2%9B%84%EF%B8%8F%E2%9D%84%EF%B8%8F</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-1-Maybe-SOC-mas-music,-he-thought,-doesn't-come-from-a-store</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-2-One-man's-false-positive-is-another-man's-potpourri</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-3-Even-if-I-wanted-to-go,-their-vulnerabilities-wouldn't-allow-it</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-4-I'm-all-atomic-inside!</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-5-SOC-mas-XX-what-ee</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-6-If-I-can't-find-a-nice-malware-to-use,-I'm-not-going</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Advent-of-Cyber-2024/Day-7-Oh,-no.-I'M-SPEAKING-IN-CLOUDTRAIL!</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Content-Discovery</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Modules/Command-Line</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Modules/Cryptography</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Modules/Networking-Fundamentals</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Modules/Networking</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Modules/Windows-and-AD-Fundamentals</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Networking-Secure-Protocols</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Paths/CyberSecurity-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/TryHackMe-TODO-List</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Active-Directory-Basics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Bypass-Really-Simple-Security</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Command-Injection</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Cryptography-Basics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Defensive-Security-Intro</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Intro-to-LAN</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Linux-Shells</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Metasploit-Introduction</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Networking-Concepts</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Networking-Core-Protocols</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Networking-Essentials</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Offensive-Security-Intro</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Public-Key-Cryptography-Basics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/SOC-L1-Alert-Triage</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Search-Skills</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Summary---Active-Directory-Basics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Walking-An-Application</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/What-is-Networking</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Windows-Command-Line</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Windows-Fundamentals-1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Windows-Fundamentals-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Windows-Fundamentals-3</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/Walkthroughs/Windows-PowerShell</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/CyberSec/Notes/TryHackMe/%F0%9F%90%A7-TryHackMe</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/2FA-Testing-Flow</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/2FA-WorkFlow</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/Decentralization,-Immutability,-and-Security-The-Key-Concepts-of-Blockchain</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/FP01-Dev-Workflow</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/JWT-Auth-DOC</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/Learn-and-Integrate-Zero-Knowledge-Proofs-(ZKP)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/More-about-ZKP</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/Pet-Health-App-Frontend-API-Integration-Documentation</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/README</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/Whole-Project-Workflow</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/ZKRollups-Doc</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP01/%F0%9F%94%90-FP01---Secure-Healthcare-Data-Management-System-using-Blockchain-and-ZKPs</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP02/About-Grouping-LEDs-together</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP02/Guide-and-Dev-Plan</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP02/Smart-Street-Lighting-IOT-Project</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP03/Cyber-Ethics-Report</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP03/Draft</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP04/XSS-Detection-Implementation-in-ZKPhealthntitled</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/FP05---SIEM-Case-Management/SIEM-Case-Management-Project-Report</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Freelancing-Projects/Freelancing-Projects</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/Raspberry-Pi/Pi-Metasploitable</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/Raspberry-Pi/Raspberry-Pi-Kali-Linux-Headless-Setup</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/Raspberry-Pi/TODO-Pi</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/ESP32-C3-Hardware-Constraints</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/Frame-Based-Animation-Rendering</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/I2S-Protocol-Deep-Dive</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/I2S-Single-Peripheral-Problem</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/PROGMEM-Flash-Storage</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/README</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Projects/student-companion-bot/</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Startup/Business-Knowldge/30-Years-of-Business-Knowledge-in-2hrs-26mins</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Startup/Business-Knowldge/ChatGPT-Guidance/1---General-Questions-Pt-1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Startup/Business-Knowldge/ChatGPT-Guidance/2---How-to-start-a-Startup-by-Sam-Altman</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Docker/100+-Docker-Concepts-you-Need-to-Know</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Docker/Docker-in-100-Seconds</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Docker/%F0%9F%94%97-Docker</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Git/%F0%9F%94%97-Git--and--GitHub</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/K8/Kubernetes-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/K8/%F0%9F%94%97-Kubernetes</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Linux/Understanding-2%3E-and-1-in-Unix-like-Shells</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Linux/Understanding-%60$0%60-in-awk</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Linux/Unix-Epoch</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/Linux/%F0%9F%94%97-Linux</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/Tools-and-Workflows/%F0%9F%94%97-Tools-and-Workflows</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/References/Man-in-the-Middle-Attack-MITM</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/References/Monoalphabetic-Substitution-Cipher---A-Detailed-Explanation</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/References/XSS-vs-HTML</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Computer-Architecture/Computer-Organization</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Computer-Architecture/Introduction-to-Computer-Architecture</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Computer-Architecture/%F0%9F%94%97-Computer-Architecture---CYBVU-23.2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Data-Communications-and-Network/Lecture-1---Introduction</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Data-Communications-and-Network/Lecture-2---Email-Services</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Data-Communications-and-Network/Lecture-3---Data-and-Signals</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Data-Communications-and-Network/Lecture-4---Communication-Medium</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Data-Communications-and-Network/Lecture-5---Wireless-Medium</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Data-Communications-and-Network/%F0%9F%94%97-Data-Communications-and-Networks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/22-Aug-Lecture-Note</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/30th-Aug-Assignment-Submission</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/Arithmetic-Expressions</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/Data-Types</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/Hello-World,-Escape-Sequences,-Comments</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/Introduction-to-Java</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/Java-Full-RECAP</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/String-args</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/User-input-(Scanner)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/Variables</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/OOP-with-JAVA/%F0%9F%94%97-Java---CYBVU-23.2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Operating-Systems/Introduction-to-Operating-Systems</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Operating-Systems/Lec-2-Process-Management</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Operating-Systems/Lec-3-Process-Control-Management</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Operating-Systems/Lec-4-Memory-Management</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Operating-Systems/Lec-5-Virtual-Memory-Management</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Operating-Systems/%F0%9F%94%97-Operating-Systems</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Spring-24'-Y1S2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/All-CSS-Concepts-at-once-(module-related)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/Client-Server-Model</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/Essential-JavaScript-Concepts-for-This-Module-Pt.1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/HTTP-vs-HTTPS</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/Introduction-to-HTML-Part-A</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/Introduction-to-HTML-Part-B</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/JavaScript-Form-Validation-Pt.-3</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/JavaScript-Pt.-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/PHP-Pt.-1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/PHP-Pt.-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/Static-vs-Dynamic-Pages</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/Website-vs-WebApp</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/What-is-the-INTERNET</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/World-Wide-Web-(WWW)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Spring-24'-Y1S2/Web-Application-Development/%F0%9F%94%97-Web-Application-Development---CYBVU-23.2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/Cyber-Law/Poster-Speech-(2)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/Cyber-Law/Poster-Speech</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/ICT-Change-Management/BuddyCheck-Peer-Review</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/ICT-Change-Management/In-Class-Activity-WEEK-7</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-08-Tutorial-08</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-09-Tutorial-09</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-10-Tutorial-10</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-11-Tutorial-11</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-2---Security,-Privacy--and--Ethics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-2-Tutorial-02-NIT2201</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-3-Tutorial-03-NIT2201</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-4-Tutorial-04-NIT2201</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-5-Tutorial-05-NIT2201</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/Week-7-Tutorial-7</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2201-Profession-and-ethics/%F0%9F%94%97-NIT2201-Profession-and-ethic</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-1---Introduction-to-the-Module</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-1-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-10-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-2---Cyber-Physical-Systems</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-2-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-3-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-5-LAB-2</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-5-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-6-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-7-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-8-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/Week-9-LAB</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Summer-25'-Y2S2/NIT2242-Data-privacy-and-cyber-physical-systems-security/%F0%9F%94%97(NIT2242)-Data-privacy-and-cyber-physical-systems-security---7K</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-1-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-2-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-3-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-4-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-5-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-6-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-7-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Lab-8-CSES</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-1---Introduction-to-Security</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-2---Malware-and-Social-Engineering-Attacks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-3----Application-and-Networking-Based-Attacks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-4---Cryptography</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-5---Cryptography-Part-II</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-6---PKI-and-Steganography</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-7---Network-Security-Fundamentals</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/Week-8---Administering-a-Secure-Network</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2102-Cybersec-Essesntials/%F0%9F%94%97-Cybersec-Essentials</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2122-Server-Administration-and-Management/Lab-1-SAAM</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2122-Server-Administration-and-Management/Lab-3-SAAM</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2122-Server-Administration-and-Management/Presentation-Case-Study</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2122-Server-Administration-and-Management/SAAM-Summarise</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2122-Server-Administration-and-Management/Week-1-Introduction-to-Windows-Server</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2122-Server-Administration-and-Management/%F0%9F%94%97-Server-Administration-and-Management</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-1-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-10-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-2-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-3-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-4-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-6-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-7-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-8-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Lab-9-DFEH</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Research-About-Hashing</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Untitled</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Week-1---Intro-to-Digital-Forensics-and-its-Processes</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Week-1-DFEH-Before-Class-Activities</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Week-2---Computer-Forensics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Week-3---Mobile-Forensics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Week-3-DFEH-Before-Class</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/Week-5----Investigative-Reports-and-Legal-Acceptance</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/XYZ-School-Investigation</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2141-Digital-Forensics-and-Ethical-Hacking/%F0%9F%94%97-Digital-Forensics-and-Ethical-Hacking</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2171-Introduction-to-Ict-Management/NIT2171-ICT-Management-Test-1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2171-Introduction-to-Ict-Management/Week-1---ICT-trends-and-challengers</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/NIT2171-Introduction-to-Ict-Management/%F0%9F%94%97-Introduction-to-Ict-Management</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-24'-Y2S1/Winter-24'-Y2S1</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/University-VU-CyberSec/Winter-26'-Y3S1/NIT3141-Security-Operations-and-Vulnerability-Analysis---7K/Lab-4--6-CyberOps</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/101/Async--and--Await</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/101/JWT-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/101/NextJS-15-Full-Course-2025-Become-a-NextJS-Pro-in-1.5-Hours</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/1---CSS-Introduction</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/10---Box-Model</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/11---The-Border-Box</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/12---The-Padding-Box</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/13---The-Margin-Box</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/14---Lines-and-Blocks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/15---Position-Property</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/16---Position-Relative-and-Z-index</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/17---Box-Sizing</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/18---Fixed-Position</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/19---Sticky-Position</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/2---Syntax</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/20---Float</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/21---Pseudo-Classes</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/3---Selectors</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/4---CSS-Colors</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/5---Measurements</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/6---CSS-Fonts</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/7---Text-Alignment-and-Decoration</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/8---CSS-Backgrounds</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/9---Shorthands</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/CSS/%F0%9F%94%97--CSS</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/1---What-is-HTML</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/10---HTML-Colors</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/11---Span--and--Div</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/12---Meta-Tags</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/13---iFrames</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/14---HTML-Buttons</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/15---HTML-Forms</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/2---HTML-Syntaxes</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/3---HyperLinks</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/4---HTML-Images</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/5---HTML-Audio</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/6---HTML-Videos</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/7---Text-Formatting</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/8---HTML-Lists</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/9---HTML-Tables</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/HTML/%F0%9F%94%97-HTML</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/NextJs/Fireship-beyond-100-seconds-NextJs</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/NextJs/NextJs-in-100-Seconds-(Full-beginners-Tutorial)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/NextJs/%F0%9F%94%97-NextJs-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/Programming-101/JSON-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/Programming-101/JavaScript-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/Programming-101/TypeScript-101</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/Programming-101/before-you-code,-learn-how-computers-work</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/Programming-101/%F0%9F%94%97-Programming-101-(Fundamentals)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/All-The-JavaScript-You-Need-To-Know-For-React-(More-JS-To-Know)</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/All-The-JavaScript-You-Need-To-Know-For-React</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/React-Introduction---Bro-Code</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/Udemy---The-Ultimate-React-Course-2024-React,-Next.js,-Redux--and--More/Pure-React</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/Udemy---The-Ultimate-React-Course-2024-React,-Next.js,-Redux--and--More/React-Vs-Vanilla-JavaScript</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/Udemy---The-Ultimate-React-Course-2024-React,-Next.js,-Redux--and--More/What-is-REACT</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/Udemy---The-Ultimate-React-Course-2024-React,-Next.js,-Redux--and--More/Why-do-FrontEnd-Frameworks-Exists</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/Udemy---The-Ultimate-React-Course-2024-React,-Next.js,-Redux--and--More/%F0%9F%94%97-Udemy---The-Ultimate-React-Course-2024-React,-Next.js,-Redux--and--More</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/React/%F0%9F%94%97-React</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/1---SQL-Introduction</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/2---Setup-MySQL</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/3---MySQL-How-to-create-a-DATABASE</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/4---MySQL-How-to-Create-Table</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/5---MySQL-How-to-INSERT-rows-into-a-TABLE</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/6---How-to-Select-Data-from-a-TABLE</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/SQL/%F0%9F%94%97-SQL</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Concepts/Programming/%F0%9F%94%97-Programming</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Coursera/Google-IT-Automation-with-Python-Professional-Certificate/1---Crash-Course-on-Python/Module-1/Course-Introduction</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Coursera/Google-IT-Automation-with-Python-Professional-Certificate/1---Crash-Course-on-Python/Module-1/Crash-Course-on-Python</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Coursera/Google-IT-Automation-with-Python-Professional-Certificate/1---Crash-Course-on-Python/Module-1/Specialization-Introduction</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Coursera/Google-IT-Automation-with-Python-Professional-Certificate/1---Crash-Course-on-Python/Module-1/%F0%9F%94%97-Module-1-Crash-Course-on-Python</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Coursera/Google-IT-Automation-with-Python-Professional-Certificate/%F0%9F%94%97-Google-IT-Automation-with-Python-Professional-Certificate</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Coursera/MongoDB-University/RAG-with-MongoDB/Preparing-the-data</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Career-Essentials-in-GitHub-Professional-Certificate/1.-Read-YAML-data---Python-to-process-YAML-with-Codespaces</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Career-Essentials-in-GitHub-Professional-Certificate/Career-Essentials-in-GitHub-Professional-Certificate</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Career-Essentials-in-GitHub-Professional-Certificate/Docker</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Career-Essentials-in-GitHub-Professional-Certificate/How-Actions-Works</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Career-Essentials-in-GitHub-Professional-Certificate/Python-to-process-YAML-with-Codespaces</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Docker-Foundations-Professional-Certificate/1---Learn-Docker/1---Docker-Explained</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Docker-Foundations-Professional-Certificate/1---Learn-Docker/2---Install-Docker</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Docker-Foundations-Professional-Certificate/1---Learn-Docker/3---Using-Docker</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Branches</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Changing-History</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Deleting-and-renaming-files</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Git-stash-and-clean</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Github-Options</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Ignore-Files---gitignore</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Manage-Conflicts</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Pushing-to-Github</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Setting-up-Git</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/Understanding-Environments</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/What-is-Git</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/What-is-Github</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/What-is-Version-Control</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/git-diff</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/Linkedin-Learning/Prepare-for-the-GitHub-Foundations-Certification/%F0%9F%94%97-Prepare-for-the-GitHub-Foundations-Certification</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/O'Reilly/Ethereum-Fundamentals/Blockchain-Benefits-and-Disadvantages</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/O'Reilly/Ethereum-Fundamentals/Blockchain-Operations</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/O'Reilly/Ethereum-Fundamentals/Blockchain-and-Hashing</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/O'Reilly/Ethereum-Fundamentals/Ethereum-Basics</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/O'Reilly/Ethereum-Fundamentals/The-New-Blockchain---Blockchain-2.0</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/Courses/O'Reilly/Ethereum-Fundamentals/%F0%9F%94%90-Ethereum-Fundamentals</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url><url>
    <loc>https://quartz.jzhao.xyz/%E8%87%AA%E5%AD%A6/LeetCode/LeetCode-75/Merge-Strings-Alternately</loc>
    <lastmod>2026-02-11T10:53:39.000Z</lastmod>
  </url></urlset>