<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le 03/04/2026 à 20:20 par All in One SEO v4.9.3 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyber-expert.fr/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyber Expert - Expertise Cybersécurité pour votre SI</title>
		<link><![CDATA[https://cyber-expert.fr]]></link>
		<description><![CDATA[Cyber Expert - Expertise Cybersécurité pour votre SI]]></description>
		<lastBuildDate><![CDATA[Wed, 03 Dec 2025 10:13:45 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyber-expert.fr/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyber-expert.fr/les-sauvegardes-une-mesure-de-cybersecurite/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/les-sauvegardes-une-mesure-de-cybersecurite/]]></link>
			<title>Cyber Expert -Les sauvegardes, une mesure de cybersécurité ?</title>
			<pubDate><![CDATA[Wed, 03 Dec 2025 10:13:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/cyber-expert-investiguer-vos-programmes-au-demarrage/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/cyber-expert-investiguer-vos-programmes-au-demarrage/]]></link>
			<title>Cyber Expert &#8211; Investiguer vos programmes au démarrage</title>
			<pubDate><![CDATA[Tue, 06 May 2025 07:39:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/mentions-legales/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/mentions-legales/]]></link>
			<title>Mentions légales</title>
			<pubDate><![CDATA[Thu, 24 Apr 2025 16:09:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/footer-three/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/footer-three/]]></link>
			<title>Footer Actif</title>
			<pubDate><![CDATA[Thu, 04 Sep 2025 12:40:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/contact/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sat, 07 Jun 2025 07:35:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/cyber-expert-purple-pill-challenge/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/cyber-expert-purple-pill-challenge/]]></link>
			<title>Cyber Expert participe au Purple Pill Challenge by RiskSummit</title>
			<pubDate><![CDATA[Mon, 05 May 2025 09:31:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/cyber-expert-comprendre-les-slos-dans-elastic/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/cyber-expert-comprendre-les-slos-dans-elastic/]]></link>
			<title>Cyber Expert &#8211; Comprendre les SLOs dans Elastic</title>
			<pubDate><![CDATA[Fri, 10 Oct 2025 14:39:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/politique-confidentialite/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/politique-confidentialite/]]></link>
			<title>Politique de Confidentialité</title>
			<pubDate><![CDATA[Thu, 24 Apr 2025 16:00:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/consulting/accompagnement/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/consulting/accompagnement/]]></link>
			<title>Accompagnement à la Mise en Conformité Cyber</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:39:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/consulting/formations/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/consulting/formations/]]></link>
			<title>Formations/Sensibilisations en Cybersécurité</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:39:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/consulting/conseil/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/consulting/conseil/]]></link>
			<title>Modèle de Conseil</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:38:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/defensif/gestion-de-crise/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/defensif/gestion-de-crise/]]></link>
			<title>Gestion de crise</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:38:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/defensif/reponse-incidents/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/defensif/reponse-incidents/]]></link>
			<title>Réponse aux incidents</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:37:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/offensif/pentest/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/offensif/pentest/]]></link>
			<title>Test d’Intrusion</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:36:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/offensif/methodologie-audit/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/offensif/methodologie-audit/]]></link>
			<title>Méthodologie d’Audit</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:36:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/defensif/soc/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/defensif/soc/]]></link>
			<title>S.O.C</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 13:35:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/consulting/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/consulting/]]></link>
			<title>Services Consulting</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 11:37:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/offensif/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/offensif/]]></link>
			<title>Services Offensifs</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 11:37:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/defensif/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/defensif/]]></link>
			<title>Services Défensifs</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 11:35:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/header-one/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/header-one/]]></link>
			<title>Header One</title>
			<pubDate><![CDATA[Wed, 09 Apr 2025 14:21:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/services/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 11:35:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/header-four/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/header-four/]]></link>
			<title>Header actif</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 13:38:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/header-two/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/header-two/]]></link>
			<title>Header Two</title>
			<pubDate><![CDATA[Wed, 09 Apr 2025 14:21:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/header-three/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/header-three/]]></link>
			<title>Header Three</title>
			<pubDate><![CDATA[Wed, 09 Apr 2025 14:21:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/forensic_dfir/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/forensic_dfir/]]></link>
			<title>Analyse Forensic / DFIR</title>
			<pubDate><![CDATA[Wed, 16 Oct 2024 11:52:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/reponse-incident/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/reponse-incident/]]></link>
			<title>Réponse à incident</title>
			<pubDate><![CDATA[Wed, 16 Oct 2024 11:52:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/defensif-2/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/defensif-2/]]></link>
			<title>Renforcez la sécurité de votre SI</title>
			<pubDate><![CDATA[Wed, 16 Oct 2024 11:50:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/audit-de-securite/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/audit-de-securite/]]></link>
			<title>Audit de sécurité</title>
			<pubDate><![CDATA[Tue, 22 Oct 2024 13:02:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/pentest/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/pentest/]]></link>
			<title>Pentest</title>
			<pubDate><![CDATA[Tue, 22 Oct 2024 10:21:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/offensif/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/offensif/]]></link>
			<title>Testez la sécurité de votre SI</title>
			<pubDate><![CDATA[Mon, 21 Oct 2024 11:23:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/consulting/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/consulting/]]></link>
			<title>Red Team</title>
			<pubDate><![CDATA[Mon, 21 Oct 2024 11:06:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/footer-four/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/footer-four/]]></link>
			<title>Footer Four</title>
			<pubDate><![CDATA[Mon, 21 Oct 2024 09:57:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/consulting-2/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/consulting-2/]]></link>
			<title>Accompagnement &#038; Formations</title>
			<pubDate><![CDATA[Wed, 16 Oct 2024 10:41:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/siem-as-a-service/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/siem-as-a-service/]]></link>
			<title>Artefact</title>
			<pubDate><![CDATA[Wed, 25 Sep 2024 08:24:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/antivirus-edr/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/antivirus-edr/]]></link>
			<title>Antivirus EDR</title>
			<pubDate><![CDATA[Wed, 25 Sep 2024 08:24:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/service/soc-as-a-service/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/service/soc-as-a-service/]]></link>
			<title>SOC as a Service</title>
			<pubDate><![CDATA[Wed, 25 Sep 2024 08:23:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/footer-one/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/footer-one/]]></link>
			<title>Footer One</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/ui-ux-design-experience/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/ui-ux-design-experience/]]></link>
			<title>UI/UX Design Experience</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/web-development/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/web-development/]]></link>
			<title>Web Development</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/digital-marketing/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/digital-marketing/]]></link>
			<title>Digital Marketing</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/cybersecurity-audit/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/cybersecurity-audit/]]></link>
			<title>Cybersecurity Audit</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/hardware-repair/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/hardware-repair/]]></link>
			<title>Hardware Repair</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/system-integration/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/system-integration/]]></link>
			<title>System Integration</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/development-website/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/development-website/]]></link>
			<title>Development Website</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/]]></link>
			<title>Accueil</title>
			<pubDate><![CDATA[Thu, 17 Apr 2025 11:33:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/header-footer/footer-two/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/header-footer/footer-two/]]></link>
			<title>Footer Two</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/quantum-code/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/quantum-code/]]></link>
			<title>Quantum Code</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/cyber-scape/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/cyber-scape/]]></link>
			<title>Cyber scape</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/project/vendor-management/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/project/vendor-management/]]></link>
			<title>Vendor Management</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 13:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyber-expert.fr/blog/]]></guid>
			<link><![CDATA[https://cyber-expert.fr/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 14:41:17 +0000]]></pubDate>
		</item>
				</channel>
</rss>
