<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://nelsondouglas.com/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-02 20:00:37 GMT -->
	<url>
		<loc>https://nelsondouglas.com/</loc>
		<lastmod>2026-02-02T10:43:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/blog-2/</loc>
		<lastmod>2025-08-05T02:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/example-report/</loc>
		<lastmod>2026-02-12T12:09:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/pre-production-web-application-testing/</loc>
		<lastmod>2025-08-04T01:55:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/cv/</loc>
		<lastmod>2025-07-13T20:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/linux/path-exploitation/</loc>
		<lastmod>2025-04-15T00:07:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/web-application/idor-access-control-vulnerability/</loc>
		<lastmod>2025-04-15T00:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/active-directory/golden-silver-ticket-attacks/</loc>
		<lastmod>2025-04-15T00:03:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/active-directory/kerberos-constrained-delegation/</loc>
		<lastmod>2025-04-15T00:01:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/web-application/</loc>
		<lastmod>2025-04-14T23:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/linux/</loc>
		<lastmod>2025-04-14T23:58:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/windows/</loc>
		<lastmod>2025-04-14T23:58:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/active-directory/</loc>
		<lastmod>2025-04-14T23:58:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/docs/active-directory/</loc>
		<lastmod>2025-04-14T23:58:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/knowledge-bases/</loc>
		<lastmod>2025-08-03T01:13:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/contact/</loc>
		<lastmod>2025-04-03T19:06:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/about2/</loc>
		<lastmod>2025-04-03T19:01:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/osint-assessments/</loc>
		<lastmod>2025-08-03T23:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/social-engineering-testing/</loc>
		<lastmod>2025-08-04T01:57:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/active-directory-penetration-testing/</loc>
		<lastmod>2025-08-04T01:48:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/linux-server-testing/</loc>
		<lastmod>2025-08-04T01:52:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/windows-server-testing/</loc>
		<lastmod>2025-08-04T02:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/api-penetration-testing/</loc>
		<lastmod>2025-08-04T01:42:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/post-prod-web-application-testing/</loc>
		<lastmod>2025-08-04T01:53:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/revenge-material-analysis/</loc>
		<lastmod>2025-08-02T19:23:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/digital-footprint-analysis-2/</loc>
		<lastmod>2025-08-04T01:36:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/web-penetration-testing/</loc>
		<lastmod>2025-08-04T01:58:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/infrastructure-penetration-testing/</loc>
		<lastmod>2025-02-12T11:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/resources/</loc>
		<lastmod>2025-02-10T22:13:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/caa/</loc>
		<lastmod>2025-02-10T20:09:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/people-solutions/</loc>
		<lastmod>2024-04-09T22:40:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/the-difference-between-ctfs-and-appsec/</loc>
		<lastmod>2025-02-11T22:31:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/a-guide-to-aws-s3-bucket-penetration-testing/</loc>
		<lastmod>2025-02-10T21:48:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/a-complete-guide-to-iso-27001-penetration-testing/</loc>
		<lastmod>2025-02-10T21:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/elementor-880/</loc>
		<lastmod>2024-07-01T08:05:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/a-penetration-testing-compliance-guide/</loc>
		<lastmod>2024-07-01T08:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/a-major-insurance-company-refused-to-pay-hackers-a-ransom-for-a-major-data-breach-heres-what-happened-next/</loc>
		<lastmod>2024-07-01T08:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/the-most-dangerous-cyber-security-threat-in-medellin-colombia/</loc>
		<lastmod>2024-07-01T08:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/how-an-old-server-increased-a-companys-attack-surface-and-lead-to-a-major-data-breach/</loc>
		<lastmod>2024-07-01T08:04:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/how-the-moveit-vulnerability-punctured-numerous-government-agencies/</loc>
		<lastmod>2024-07-01T08:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/the-tmx-breach-and-the-importance-of-endpoint-protections/</loc>
		<lastmod>2024-07-01T10:19:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/elementor-766/</loc>
		<lastmod>2024-04-08T10:03:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/the-23ampme-data-breach-and-the-risks-of-poor-cybersecurity-best-practice-enforcement/</loc>
		<lastmod>2024-07-01T08:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/achieving-excellence-with-skilled-engineering-contractors/</loc>
		<lastmod>2025-02-10T21:47:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/innovative-engineering-solutions-for-modern-challenges/</loc>
		<lastmod>2025-02-10T21:47:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/why-experience-matters-in-engineering-services/</loc>
		<lastmod>2025-02-10T21:47:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/navigating-complex-projects-with-expert-engineers/</loc>
		<lastmod>2025-02-10T21:49:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/transforming-businesses-with-skilled-engineering/</loc>
		<lastmod>2025-02-10T21:48:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/top-traits-of-high-performing-engineering-teams/</loc>
		<lastmod>2025-02-10T21:48:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/the-benefits-of-hiring-expert-engineering-services/</loc>
		<lastmod>2025-02-10T21:48:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://nelsondouglas.com/how-to-choose-the-right-engineering-contractor/</loc>
		<lastmod>2025-02-10T21:48:23+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
