<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 4 April 2026 at 6:36 am by All in One SEO v4.5.9.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://rootbrain.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>RootBrain.Com · The Best IT Security Training &amp; Consulting</title>
		<link><![CDATA[https://rootbrain.com]]></link>
		<description><![CDATA[RootBrain.Com · The Best IT Security Training &amp; Consulting]]></description>
		<lastBuildDate><![CDATA[Wed, 25 Apr 2012 16:57:57 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://rootbrain.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/building-optimizing-internet-access-using-proxy-cache-server/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/building-optimizing-internet-access-using-proxy-cache-server/]]></link>
			<title>Building &#038; Optimizing Internet Access using Proxy Cache Server</title>
			<pubDate><![CDATA[Wed, 25 Apr 2012 16:57:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/]]></link>
			<title>Courses</title>
			<pubDate><![CDATA[Wed, 13 Mar 2013 07:31:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/services/network-security-training/]]></guid>
			<link><![CDATA[https://rootbrain.com/services/network-security-training/]]></link>
			<title>Training</title>
			<pubDate><![CDATA[Wed, 13 Mar 2013 07:30:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/]]></link>
			<title>Training</title>
			<pubDate><![CDATA[Wed, 13 Mar 2013 07:30:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/kelas-soremalam/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/kelas-soremalam/]]></link>
			<title>Kelas Sore/Malam</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:39:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/in-house/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/in-house/]]></link>
			<title>In-House</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:39:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/linux-server-administration/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/linux-server-administration/]]></link>
			<title>Linux Server Administration</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:38:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/ccna-fast-track/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/ccna-fast-track/]]></link>
			<title>CCNA Fast Track</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:37:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/services/professional-recruitment/]]></guid>
			<link><![CDATA[https://rootbrain.com/services/professional-recruitment/]]></link>
			<title>ITPro Recruitment</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:37:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/services/elearning/]]></guid>
			<link><![CDATA[https://rootbrain.com/services/elearning/]]></link>
			<title>e-Learning</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:37:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/about-us/about-rootbrain/]]></guid>
			<link><![CDATA[https://rootbrain.com/about-us/about-rootbrain/]]></link>
			<title>About RootBrain</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 11:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2012/07/workshop-ethical-hacking-perimeter-defense-di-stt-adisucipto/]]></guid>
			<link><![CDATA[https://rootbrain.com/2012/07/workshop-ethical-hacking-perimeter-defense-di-stt-adisucipto/]]></link>
			<title>Workshop Ethical Hacking &#038; Perimeter Defense di STTA Yogyakarta</title>
			<pubDate><![CDATA[Wed, 04 Feb 2015 01:38:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2011/03/kuliah-tamu-di-teknik-informatika-ums-solo/]]></guid>
			<link><![CDATA[https://rootbrain.com/2011/03/kuliah-tamu-di-teknik-informatika-ums-solo/]]></link>
			<title>Kuliah Tamu di Teknik Informatika UMS, Solo</title>
			<pubDate><![CDATA[Wed, 04 Apr 2012 16:29:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/in-house/promo-in-house/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/in-house/promo-in-house/]]></link>
			<title>Promo In-House</title>
			<pubDate><![CDATA[Tue, 27 Mar 2018 23:16:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/computer-forensic-investigation/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/computer-forensic-investigation/]]></link>
			<title>Computer  Forensic Investigation</title>
			<pubDate><![CDATA[Tue, 26 Mar 2024 14:29:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/penetration-testing-perimeter-defense/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/penetration-testing-perimeter-defense/]]></link>
			<title>Penetration Testing &#038; Perimeter Defense</title>
			<pubDate><![CDATA[Tue, 26 Mar 2024 14:25:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/about-us/meet-our-team/]]></guid>
			<link><![CDATA[https://rootbrain.com/about-us/meet-our-team/]]></link>
			<title>Meet Our Team</title>
			<pubDate><![CDATA[Tue, 19 Sep 2017 03:36:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2011/09/hacker-pantau-300-000-pengguna-gmail-di-iran/]]></guid>
			<link><![CDATA[https://rootbrain.com/2011/09/hacker-pantau-300-000-pengguna-gmail-di-iran/]]></link>
			<title>Hacker Pantau 300.000 Pengguna Gmail di Iran</title>
			<pubDate><![CDATA[Thu, 20 Sep 2012 06:02:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2011/09/kejahatan-maya-rugikan-114-miliar-dollartahun/]]></guid>
			<link><![CDATA[https://rootbrain.com/2011/09/kejahatan-maya-rugikan-114-miliar-dollartahun/]]></link>
			<title>Kejahatan Maya Rugikan 114 Miliar Dollar/Tahun</title>
			<pubDate><![CDATA[Thu, 20 Sep 2012 06:02:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2012/06/inhouse-training-comptia-linux-stmik-amikom/]]></guid>
			<link><![CDATA[https://rootbrain.com/2012/06/inhouse-training-comptia-linux-stmik-amikom/]]></link>
			<title>Inhouse Training CompTIA Linux+ STMIK AMIKOM</title>
			<pubDate><![CDATA[Thu, 20 Sep 2012 06:02:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/services/]]></guid>
			<link><![CDATA[https://rootbrain.com/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Thu, 13 Oct 2011 03:09:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2015/05/seminar-nasional-the-safety-of-telecommunication-hacking-with-network-security/]]></guid>
			<link><![CDATA[https://rootbrain.com/2015/05/seminar-nasional-the-safety-of-telecommunication-hacking-with-network-security/]]></link>
			<title>Seminar Nasional : “The Safety of Telecommunication Hacking with Network Security”</title>
			<pubDate><![CDATA[Thu, 13 Aug 2015 22:59:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2011/10/lowongan-it-trainerinstruktur-dan-marketing-executive/]]></guid>
			<link><![CDATA[https://rootbrain.com/2011/10/lowongan-it-trainerinstruktur-dan-marketing-executive/]]></link>
			<title>Lowongan IT Trainer/Instruktur dan Marketing Executive</title>
			<pubDate><![CDATA[Thu, 06 Oct 2011 22:49:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/registration/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/registration/]]></link>
			<title>Registration</title>
			<pubDate><![CDATA[Sun, 29 Apr 2018 07:26:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/contact/]]></guid>
			<link><![CDATA[https://rootbrain.com/contact/]]></link>
			<title>Contact</title>
			<pubDate><![CDATA[Sun, 29 Apr 2018 07:25:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2013/05/seminar-nasional-network-security-cloud-computing-security-uu-ite/]]></guid>
			<link><![CDATA[https://rootbrain.com/2013/05/seminar-nasional-network-security-cloud-computing-security-uu-ite/]]></link>
			<title>Seminar Nasional Network Security: Cloud Computing Security &#038; UU ITE</title>
			<pubDate><![CDATA[Sun, 23 Jun 2013 15:44:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2013/04/seminar-and-workshop-ethical-hacking-perimeter-defense/]]></guid>
			<link><![CDATA[https://rootbrain.com/2013/04/seminar-and-workshop-ethical-hacking-perimeter-defense/]]></link>
			<title>Seminar Workshop Ethical Hacking &amp; Perimeter Defense</title>
			<pubDate><![CDATA[Sun, 23 Jun 2013 15:40:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/our-partner-client/]]></guid>
			<link><![CDATA[https://rootbrain.com/our-partner-client/]]></link>
			<title>Clients</title>
			<pubDate><![CDATA[Sun, 07 May 2017 05:32:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/schedules/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/schedules/]]></link>
			<title>Schedules</title>
			<pubDate><![CDATA[Sun, 07 May 2017 05:24:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/services/workshop/]]></guid>
			<link><![CDATA[https://rootbrain.com/services/workshop/]]></link>
			<title>Workshop</title>
			<pubDate><![CDATA[Sat, 26 Nov 2011 03:42:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/free-materials/]]></guid>
			<link><![CDATA[https://rootbrain.com/free-materials/]]></link>
			<title>Free Materials</title>
			<pubDate><![CDATA[Sat, 20 Aug 2016 05:29:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/wireless-management-and-security/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/wireless-management-and-security/]]></link>
			<title>Wireless Management &#038; Security</title>
			<pubDate><![CDATA[Sat, 20 Aug 2016 05:27:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2011/06/seminar-e-government/]]></guid>
			<link><![CDATA[https://rootbrain.com/2011/06/seminar-e-government/]]></link>
			<title>Seminar E-Government di STTA Yogyakarta</title>
			<pubDate><![CDATA[Sat, 05 Nov 2011 14:09:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/comptia-network/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/comptia-network/]]></link>
			<title>CompTIA Network+</title>
			<pubDate><![CDATA[Sat, 03 May 2014 11:04:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2014/03/training-ethical-hacking-perimeter-defense-pada-lembaga-sandi-negara-lemsaneg/]]></guid>
			<link><![CDATA[https://rootbrain.com/2014/03/training-ethical-hacking-perimeter-defense-pada-lembaga-sandi-negara-lemsaneg/]]></link>
			<title>Training Ethical Hacking &#038; Perimeter Defense pada Lembaga Sandi Negara (LEMSANEG)</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 14:46:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2013/06/kuliah-umum-ethical-hacking-di-teknik-informatika-unsoed/]]></guid>
			<link><![CDATA[https://rootbrain.com/2013/06/kuliah-umum-ethical-hacking-di-teknik-informatika-unsoed/]]></link>
			<title>Kuliah Umum Ethical Hacking di Teknik Informatika UNSOED</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 14:44:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2014/03/semiar-nasional-internet-security-digital-forensic-sdm-digital-forensic-langka-peluang-karir-terbuka/]]></guid>
			<link><![CDATA[https://rootbrain.com/2014/03/semiar-nasional-internet-security-digital-forensic-sdm-digital-forensic-langka-peluang-karir-terbuka/]]></link>
			<title>Seminar Nasional Internet Security &#038; Digital Forensic: SDM Digital Forensic Langka, Peluang Karir Terbuka</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 14:43:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2014/06/fgd-antisipasi-kejahatan-dunia-maya-cyber-crime-oleh-lemhanas-ri/]]></guid>
			<link><![CDATA[https://rootbrain.com/2014/06/fgd-antisipasi-kejahatan-dunia-maya-cyber-crime-oleh-lemhanas-ri/]]></link>
			<title>FGD Antisipasi Kejahatan Dunia Maya (Cyber Crime) oleh LEMHANAS RI</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 14:06:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2015/03/seminar-workshop-nasional-network-security-with-linux-di-uajy/]]></guid>
			<link><![CDATA[https://rootbrain.com/2015/03/seminar-workshop-nasional-network-security-with-linux-di-uajy/]]></link>
			<title>Seminar &#038; Workshop Nasional Network Security with Linux di UAJY</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 13:57:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2015/12/kuliah-umum-network-and-system-security-di-ukdw/]]></guid>
			<link><![CDATA[https://rootbrain.com/2015/12/kuliah-umum-network-and-system-security-di-ukdw/]]></link>
			<title>Kuliah Umum “Network and System Security” di UKDW</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 13:44:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2016/04/seminar-keamanan-informasi-lock-n-lock-stmi-jakarta/]]></guid>
			<link><![CDATA[https://rootbrain.com/2016/04/seminar-keamanan-informasi-lock-n-lock-stmi-jakarta/]]></link>
			<title>Seminar Keamanan Informasi &#8220;Lock &#8216;n Lock&#8221; STMI Jakarta</title>
			<pubDate><![CDATA[Sat, 02 Jul 2016 13:44:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2016/10/seminar-nasional-network-security/]]></guid>
			<link><![CDATA[https://rootbrain.com/2016/10/seminar-nasional-network-security/]]></link>
			<title>Seminar Nasional Network Security di Gorontalo</title>
			<pubDate><![CDATA[Mon, 31 Oct 2016 02:25:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2012/04/seminar-digital-forensic-uncovering-crimes-using-digital-evidence/]]></guid>
			<link><![CDATA[https://rootbrain.com/2012/04/seminar-digital-forensic-uncovering-crimes-using-digital-evidence/]]></link>
			<title>Seminar Digital Forensic &#8220;Uncovering Crimes Using Digital Evidence&#8221;</title>
			<pubDate><![CDATA[Mon, 14 May 2012 08:46:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2009/05/top-ten-web-hacking-techniques-of-2008/]]></guid>
			<link><![CDATA[https://rootbrain.com/2009/05/top-ten-web-hacking-techniques-of-2008/]]></link>
			<title>Top Ten Web Hacking Techniques of 2008</title>
			<pubDate><![CDATA[Mon, 14 May 2012 08:44:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/comptia-linux/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/comptia-linux/]]></link>
			<title>CompTIA Linux+</title>
			<pubDate><![CDATA[Fri, 29 Mar 2013 04:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2014/03/lowongan-marketing-executive-2014/]]></guid>
			<link><![CDATA[https://rootbrain.com/2014/03/lowongan-marketing-executive-2014/]]></link>
			<title>Lowongan Marketing Executive (2014)</title>
			<pubDate><![CDATA[Fri, 25 Apr 2014 05:10:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2011/11/seminar-komputer-forensik-di-unriyo-23-november-2011/]]></guid>
			<link><![CDATA[https://rootbrain.com/2011/11/seminar-komputer-forensik-di-unriyo-23-november-2011/]]></link>
			<title>Seminar Komputer Forensik di UNRIYO 23 November 2011</title>
			<pubDate><![CDATA[Fri, 14 Nov 2014 03:08:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/2016/05/seminar-keamanan-jaringan-learn-and-protect-your-network-security-di-amikom-yogyakarta/]]></guid>
			<link><![CDATA[https://rootbrain.com/2016/05/seminar-keamanan-jaringan-learn-and-protect-your-network-security-di-amikom-yogyakarta/]]></link>
			<title>Seminar Keamanan Jaringan “Learn and Protect Your Network Security” di AMIKOM Yogyakarta</title>
			<pubDate><![CDATA[Fri, 10 Jun 2016 22:19:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/services/network-security-consulting/]]></guid>
			<link><![CDATA[https://rootbrain.com/services/network-security-consulting/]]></link>
			<title>Consulting</title>
			<pubDate><![CDATA[Fri, 07 Dec 2012 06:27:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://rootbrain.com/training/training-courses/comptia-security-plus/]]></guid>
			<link><![CDATA[https://rootbrain.com/training/training-courses/comptia-security-plus/]]></link>
			<title>CompTIA Security+</title>
			<pubDate><![CDATA[Fri, 06 Feb 2015 06:09:27 +0000]]></pubDate>
		</item>
				</channel>
</rss>
