<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 04/03/2026 at 9:32 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.aumakuatech.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Aumakua Technical Solutions</title>
		<link><![CDATA[https://www.aumakuatech.com]]></link>
		<description><![CDATA[Aumakua Technical Solutions]]></description>
		<lastBuildDate><![CDATA[Thu, 11 May 2023 21:32:38 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.aumakuatech.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.aumakuatech.com/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 11 May 2023 21:32:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/accessibility-statement/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/accessibility-statement/]]></link>
			<title>Accessibility statement</title>
			<pubDate><![CDATA[Thu, 23 Oct 2025 23:51:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/ai-cybersecurity/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/ai-cybersecurity/]]></link>
			<title>AI &#038; Cybersecurity</title>
			<pubDate><![CDATA[Sun, 09 Jul 2023 16:02:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/why-cyber-security-training-is-important/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/why-cyber-security-training-is-important/]]></link>
			<title>Why Cyber Security Training Is Important</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:43:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/types-of-malware/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/types-of-malware/]]></link>
			<title>Types of Malware</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:43:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/careers/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/careers/]]></link>
			<title>Careers</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 01:25:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/services/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 00:58:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/]]></link>
			<title>Knowledge Base</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 00:53:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/about-ats/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/about-ats/]]></link>
			<title>About ATS</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 00:50:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/certifications/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/certifications/]]></link>
			<title>Certifications</title>
			<pubDate><![CDATA[Fri, 16 Jun 2023 19:35:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/types-of-human-error-exploits/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/types-of-human-error-exploits/]]></link>
			<title>Types of Human Error Exploits</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:42:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/terms-conditions/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/terms-conditions/]]></link>
			<title>Terms &#038; Conditions</title>
			<pubDate><![CDATA[Sun, 07 May 2023 22:19:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/types-of-cyber-threats/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/types-of-cyber-threats/]]></link>
			<title>Types of Cyber Threats</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:41:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/prevent-zero-day-exploits/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/prevent-zero-day-exploits/]]></link>
			<title>Prevent Zero Day Exploits</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:41:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/phishing-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/phishing-attacks/]]></link>
			<title>Phishing Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:41:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/password-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/password-attacks/]]></link>
			<title>Password Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:40:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/man-in-the-middle-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/man-in-the-middle-attacks/]]></link>
			<title>Man In The Middle Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/drive-by-download-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/drive-by-download-attacks/]]></link>
			<title>Drive by Download Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:39:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/dns-tunneling-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/dns-tunneling-attacks/]]></link>
			<title>DNS Tunneling Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:39:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/denial-of-service-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/denial-of-service-attacks/]]></link>
			<title>Denial of Service Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:39:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/cybersecurity-legal-and-regulatory-requirements/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/cybersecurity-legal-and-regulatory-requirements/]]></link>
			<title>Cybersecurity Legal and Regulatory Requirements</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:38:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/cross-site-scripting-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/cross-site-scripting-attacks/]]></link>
			<title>Cross-Site Scripting Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:37:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/contact-us/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:25:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/core-competencies/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/core-competencies/]]></link>
			<title>Core Competencies</title>
			<pubDate><![CDATA[Fri, 24 Oct 2025 01:28:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/privacy-policy/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Mon, 13 Mar 2023 00:43:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/disclaimer/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/disclaimer/]]></link>
			<title>Disclaimer</title>
			<pubDate><![CDATA[Mon, 13 Mar 2023 00:40:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.aumakuatech.com/knowledge-base/sql-injection-cyber-attacks/]]></guid>
			<link><![CDATA[https://www.aumakuatech.com/knowledge-base/sql-injection-cyber-attacks/]]></link>
			<title>SQL Injection Cyber Attacks</title>
			<pubDate><![CDATA[Mon, 12 Jun 2023 02:41:35 +0000]]></pubDate>
		</item>
				</channel>
</rss>
