<?xml version="1.0" encoding="UTF-8"?><ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>cyber-awareness-training</Name><Prefix></Prefix><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>best-practices-for-cyber-awareness-training-in-2024.html</Key><LastModified>2024-09-07T07:12:31.887Z</LastModified><ETag>&quot;68e1cb2831d7161833e0e39001890e78&quot;</ETag><Size>26345</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>building-an-effective-cyber-awareness-training-plan.html</Key><LastModified>2024-09-07T07:12:31.257Z</LastModified><ETag>&quot;30cdeb4f38180f70a937195864145b78&quot;</ETag><Size>26317</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>cyber-awareness-training-defend-against-cyber-threats.html</Key><LastModified>2024-09-07T07:12:31.572Z</LastModified><ETag>&quot;9c509bbae52b87896cee3f02ab1a60d5&quot;</ETag><Size>26386</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>cyber-threats-how-cyber-awareness-training-helps.html</Key><LastModified>2024-09-07T07:12:32.196Z</LastModified><ETag>&quot;0fcfaf691b9f00e3da9eb1b8d3eae671&quot;</ETag><Size>26213</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>feed.xml</Key><LastModified>2024-09-07T07:12:32.616Z</LastModified><ETag>&quot;ec990da3286897e8b321604177dd0d94&quot;</ETag><Size>51500</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-awareness-training-1.jpg</Key><LastModified>2024-09-07T07:12:34.801Z</LastModified><ETag>&quot;04e05eb1f45f32fe11fec4edc2cc88f6&quot;</ETag><Size>284915</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-awareness-training-2.jpg</Key><LastModified>2024-09-07T07:12:35.009Z</LastModified><ETag>&quot;128675a0ca34684bf2fa4cbaff56162d&quot;</ETag><Size>324400</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-awareness-training-3.jpg</Key><LastModified>2024-09-07T07:12:35.213Z</LastModified><ETag>&quot;21ece578a3144affce605752e5097cf0&quot;</ETag><Size>272823</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-awareness-training-4.jpg</Key><LastModified>2024-09-07T07:12:35.412Z</LastModified><ETag>&quot;af781e55d9dd5492b9c1ab96eee1109f&quot;</ETag><Size>283713</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-awareness-training.jpg</Key><LastModified>2024-09-07T07:12:34.599Z</LastModified><ETag>&quot;20d2a15fd131a06ebe401df6c44476ef&quot;</ETag><Size>277284</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-awareness-in-organisations-1.jpg</Key><LastModified>2024-09-07T07:12:33.777Z</LastModified><ETag>&quot;141b78079eb65e55e68653d26f729d95&quot;</ETag><Size>172861</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-awareness-in-organisations-2.jpg</Key><LastModified>2024-09-07T07:12:33.975Z</LastModified><ETag>&quot;f200bac49e8b159f1be52052e109405c&quot;</ETag><Size>274066</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-awareness-in-organisations-3.jpg</Key><LastModified>2024-09-07T07:12:34.177Z</LastModified><ETag>&quot;3d4ef7f1dc8e2ad6c88fdc22dfc358a7&quot;</ETag><Size>237160</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-awareness-in-organisations-4.jpg</Key><LastModified>2024-09-07T07:12:34.390Z</LastModified><ETag>&quot;fdfa9980ec80896c6416f33545d31143&quot;</ETag><Size>366341</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/cyber-security-awareness-in-organisations.jpg</Key><LastModified>2024-09-07T07:12:33.576Z</LastModified><ETag>&quot;b536f053ab58f65ad35020f671801f27&quot;</ETag><Size>204303</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/logo.jpg</Key><LastModified>2024-09-07T07:12:35.606Z</LastModified><ETag>&quot;0ac573a7c7602f5e74c32fb9f5b793eb&quot;</ETag><Size>6902</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>img/logox1000.jpg</Key><LastModified>2024-09-07T07:12:35.801Z</LastModified><ETag>&quot;cceb8cb47a7799d55286e46754ee4128&quot;</ETag><Size>45841</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>index.html</Key><LastModified>2024-09-07T07:12:30.286Z</LastModified><ETag>&quot;540ece7b392d57f4d82bb7ca040dbe4c&quot;</ETag><Size>43211</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>page-urls.pdf</Key><LastModified>2024-09-07T07:12:36.037Z</LastModified><ETag>&quot;9fbed81572d5398eb11d6a4fd55a1233&quot;</ETag><Size>7859</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>privacy-policy.html</Key><LastModified>2024-09-07T07:12:32.420Z</LastModified><ETag>&quot;1521f122a76d11a6a7aa859562939bdd&quot;</ETag><Size>16978</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>robots.txt</Key><LastModified>2024-09-07T07:12:33.023Z</LastModified><ETag>&quot;d24f6271b283eb411a089083de042860&quot;</ETag><Size>290</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>sitemap.html</Key><LastModified>2024-09-07T07:12:32.825Z</LastModified><ETag>&quot;980b42e1cf635f25c14bdc99e36715f7&quot;</ETag><Size>12929</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>top-benefits-of-cyber-awareness-training-programs.html</Key><LastModified>2024-09-07T07:12:30.927Z</LastModified><ETag>&quot;7cbccb320504e69fbb7e065b00cec28c&quot;</ETag><Size>26302</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Contents><Key>why-cyber-awareness-training-is-vital-for-security.html</Key><LastModified>2024-09-07T07:12:30.597Z</LastModified><ETag>&quot;3e87a061185168ae3b093f491df87c75&quot;</ETag><Size>26232</Size><StorageClass>STANDARD</StorageClass><Owner><ID>15562813</ID><DisplayName>15562813</DisplayName></Owner><Type>Normal</Type></Contents><Marker></Marker></ListBucketResult>