<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 4 April 2026 at 5:13 AM by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberbird.in/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyber Bird</title>
		<link><![CDATA[https://cyberbird.in]]></link>
		<description><![CDATA[Cyber Bird]]></description>
		<lastBuildDate><![CDATA[Tue, 17 Feb 2026 22:04:42 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberbird.in/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberbird.in/roadmap-to-become-a-cyber-security-analyst-in-2026/]]></guid>
			<link><![CDATA[https://cyberbird.in/roadmap-to-become-a-cyber-security-analyst-in-2026/]]></link>
			<title>Roadmap to Become a Cyber Security Analyst in 2026</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 22:04:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/how-to-choose-the-right-cyber-security-course-in-2026-avoid-these-mistakes/]]></guid>
			<link><![CDATA[https://cyberbird.in/how-to-choose-the-right-cyber-security-course-in-2026-avoid-these-mistakes/]]></link>
			<title>How to Choose the Right Cyber Security Course in 2026 (Avoid These Mistakes)</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 20:42:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/how-hackers-use-social-engineering-to-attack-people-real-examples/]]></guid>
			<link><![CDATA[https://cyberbird.in/how-hackers-use-social-engineering-to-attack-people-real-examples/]]></link>
			<title>How Hackers Use Social Engineering to Attack People (Real Examples)</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 20:39:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/cyber-security-risks-during-war-what-people-should-know-in-2026/]]></guid>
			<link><![CDATA[https://cyberbird.in/cyber-security-risks-during-war-what-people-should-know-in-2026/]]></link>
			<title>Cyber Security Risks During War – What People Should Know in 2026</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 20:36:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/why-students-should-learn-cyber-security-in-2026/]]></guid>
			<link><![CDATA[https://cyberbird.in/why-students-should-learn-cyber-security-in-2026/]]></link>
			<title>Why Students Should Learn Cyber Security in 2026</title>
			<pubDate><![CDATA[Tue, 17 Feb 2026 21:57:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hack-me-rooms-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hack-me-rooms-5/]]></link>
			<title>Try Hack me rooms &#8211; 5</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 12:32:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/blogs/]]></guid>
			<link><![CDATA[https://cyberbird.in/blogs/]]></link>
			<title>Blogs</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 20:00:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/tryhackeme-rooms-4/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/tryhackeme-rooms-4/]]></link>
			<title>tryhackeme rooms &#8211; 4</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 12:32:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/]]></guid>
			<link><![CDATA[https://cyberbird.in/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 22:22:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/top-5-cybersecurity-tools-every-ethical-hacker-must-know-in-2025/]]></guid>
			<link><![CDATA[https://cyberbird.in/top-5-cybersecurity-tools-every-ethical-hacker-must-know-in-2025/]]></link>
			<title>Top 5 Cybersecurity Tools Every Ethical Hacker Must Know in 2025</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:58:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/how-i-train-beginners-in-ethical-hacking-the-robin-paul-11-learning-method/]]></guid>
			<link><![CDATA[https://cyberbird.in/how-i-train-beginners-in-ethical-hacking-the-robin-paul-11-learning-method/]]></link>
			<title>How I Train Beginners in Ethical Hacking – The Robin Paul 1:1 Learning Method</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:50:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/meet-robin-paul-peluri-the-cybersecurity-mentor-behind-cyber-bird/]]></guid>
			<link><![CDATA[https://cyberbird.in/meet-robin-paul-peluri-the-cybersecurity-mentor-behind-cyber-bird/]]></link>
			<title>Meet &#8211; Robin Paul – The Cybersecurity Mentor Behind Cyber Bird”</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:49:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/is-cybersecurity-a-good-career-in-2025/]]></guid>
			<link><![CDATA[https://cyberbird.in/is-cybersecurity-a-good-career-in-2025/]]></link>
			<title>Is Cybersecurity a Good Career in 2025?</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:48:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/why-every-beginner-should-learn-ethical-hacking-in-2025/]]></guid>
			<link><![CDATA[https://cyberbird.in/why-every-beginner-should-learn-ethical-hacking-in-2025/]]></link>
			<title>Why Every Beginner Should Learn Ethical Hacking in 2025</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:48:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/courses/]]></guid>
			<link><![CDATA[https://cyberbird.in/courses/]]></link>
			<title>Cyber Security Courses</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:44:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/]]></link>
			<title>Ethical Hacking</title>
			<pubDate><![CDATA[Sun, 23 Nov 2025 17:41:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/contact-us/]]></guid>
			<link><![CDATA[https://cyberbird.in/contact-us/]]></link>
			<title>Contact us</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:44:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/tryhackme-rooms-6/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/tryhackme-rooms-6/]]></link>
			<title>tryhackme rooms &#8211; 6</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 12:32:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hack-me-rooms-3-2/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hack-me-rooms-3-2/]]></link>
			<title>try hack me rooms &#8211; 3</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 12:32:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/refund_policy/]]></guid>
			<link><![CDATA[https://cyberbird.in/refund_policy/]]></link>
			<title>Refund Policy</title>
			<pubDate><![CDATA[Thu, 29 May 2025 17:56:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/about-robin-paul/]]></guid>
			<link><![CDATA[https://cyberbird.in/about-robin-paul/]]></link>
			<title>About &#8211; Robin Paul – Ethical Hacker, Cybersecurity Trainer &#038; Founder of Cyber Bird</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:41:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/about/]]></guid>
			<link><![CDATA[https://cyberbird.in/about/]]></link>
			<title>About</title>
			<pubDate><![CDATA[Sun, 27 Jul 2025 17:41:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/product/advance-penetration-testing/]]></guid>
			<link><![CDATA[https://cyberbird.in/product/advance-penetration-testing/]]></link>
			<title>Advance Penetration Testing</title>
			<pubDate><![CDATA[Sat, 26 Jul 2025 05:35:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/cyber-security-courses/]]></guid>
			<link><![CDATA[https://cyberbird.in/cyber-security-courses/]]></link>
			<title>cybercourses</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 19:04:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/dashboard/]]></guid>
			<link><![CDATA[https://cyberbird.in/dashboard/]]></link>
			<title>Dashboard</title>
			<pubDate><![CDATA[Fri, 25 Jul 2025 18:51:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hackme-ohsint/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hackme-ohsint/]]></link>
			<title>Try Hackme OHSINT</title>
			<pubDate><![CDATA[Fri, 20 Dec 2024 10:29:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hack-me-rooms-2-2/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hack-me-rooms-2-2/]]></link>
			<title>Try hack me rooms 2</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 12:31:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/track-hack-me-rooms-1/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/track-hack-me-rooms-1/]]></link>
			<title>Track Hack Me Rooms -1</title>
			<pubDate><![CDATA[Tue, 17 Dec 2024 12:31:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/product/web-penetration-testing/]]></guid>
			<link><![CDATA[https://cyberbird.in/product/web-penetration-testing/]]></link>
			<title>Web Penetration Testing</title>
			<pubDate><![CDATA[Thu, 12 Dec 2024 18:37:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/product/ethical-hacking/]]></guid>
			<link><![CDATA[https://cyberbird.in/product/ethical-hacking/]]></link>
			<title>Ethical Hacking</title>
			<pubDate><![CDATA[Sun, 23 Nov 2025 17:41:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/tryhackme-platform/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/tryhackme-platform/]]></link>
			<title>Tryhackme Platform</title>
			<pubDate><![CDATA[Mon, 16 Dec 2024 16:56:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hackme-vpn/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking/lesson/try-hackme-vpn/]]></link>
			<title>Try Hackme VPN</title>
			<pubDate><![CDATA[Mon, 16 Dec 2024 16:55:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/ohsint-6/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/ohsint-6/]]></link>
			<title>Ohsint</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/ip-logger-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/ip-logger-5/]]></link>
			<title>IP Logger</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/spiderfoot-4/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/spiderfoot-4/]]></link>
			<title>SpiderFoot</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/dark-net-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/dark-net-5/]]></link>
			<title>Dark Net</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/scanning-basics-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/scanning-basics-5/]]></link>
			<title>Scanning Basics</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/try-hackme-installtion-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/try-hackme-installtion-5/]]></link>
			<title>Try Hackme Installtion</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/pickle-rick-room-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/pickle-rick-room-5/]]></link>
			<title>Pickle Rick Room</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/bounty-hunter-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/bounty-hunter-5/]]></link>
			<title>Bounty Hunter</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/burp-suite-configuration-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/burp-suite-configuration-5/]]></link>
			<title>Burp suite Configuration</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/password-brute-force-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/password-brute-force-5/]]></link>
			<title>Password Brute Force</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/file-upload-vulnerability-dvwa-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/file-upload-vulnerability-dvwa-5/]]></link>
			<title>File Upload Vulnerability &#8211; DVWA</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/file-upload-vulnerability-medium-4/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/file-upload-vulnerability-medium-4/]]></link>
			<title>File Upload Vulnerability {Medium}</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/xss-stored-vulnerability-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/xss-stored-vulnerability-5/]]></link>
			<title>XSS Stored Vulnerability</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/command-injection-vulnerability-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/command-injection-vulnerability-5/]]></link>
			<title>Command Injection Vulnerability</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/location-tracking-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/location-tracking-5/]]></link>
			<title>Location Tracking</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/instagram-phishing-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/instagram-phishing-5/]]></link>
			<title>Instagram Phishing</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/metasploitable-2-5/]]></guid>
			<link><![CDATA[https://cyberbird.in/Courses/ethical-hacking-ceh/lesson/metasploitable-2-5/]]></link>
			<title>Metasploitable 2</title>
			<pubDate><![CDATA[Fri, 06 Dec 2024 06:24:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbird.in/terms_condtions/]]></guid>
			<link><![CDATA[https://cyberbird.in/terms_condtions/]]></link>
			<title>Terms &#038; Condtions</title>
			<pubDate><![CDATA[Fri, 02 Jan 2026 21:39:07 +0000]]></pubDate>
		</item>
				</channel>
</rss>
