<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.msppentesting.com</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/style-guide</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/pentest-partner</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/about-msp-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/msp-resources</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/white-labeled-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/attested-3rd-party-manual-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/automated-and-ai-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/get-a-pentest-quote</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/pentest-report-template</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/environments/cloud-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/environments/external-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/environments/internal-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/environments/social-engineering</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/environments/web-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/environments/wifi-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/active-directory-audit</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/affordable-manual-pentesting-where-to-find-it</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ai-pentest-tools</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ai-pentest-tools-for-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ai-pentesting-findings</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ai-pentesting-for-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ai-pentesting-vs-manual-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/application-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/assess-vendor-risk</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/assessing-network-security</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/automated-network-security-scan</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/automated-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/basics-of-ethical-hacking</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/best-penetration-testing-companies</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/black-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/burp-automated-scan</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cascadia-ot-security-sister-practice-ot-ics-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/change-remote-desktop-port</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/channel-only-pentest-vendor-matters</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/channel-sales</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cloud-based-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cloud-computing-security-risks</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/common-web-application-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/companies-providing-computer-security-services</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/compliance-grc-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/continuous-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cost-of-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cyber-security-audit-checklist</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cybersecurity-for-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cybersecurity-in-fintech</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cybersecurity-risk-assessment-framework</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/cybersecurity-services-for-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/define-dmz-in-networking</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/device-management-software</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/disable-windows-defender-windows-10</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/extensible-authentication-protocol-eap</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/external-network-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/external-penetration-testing-cost</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/forms-of-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/governance-risk-and-compliance-tools</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/grc-software-comparison-msp</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/hiring-pentesters</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/how-much-does-a-penetration-test-cost</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/how-much-is-affordable-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/how-to-become-a-penetration-tester</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/how-to-gain-more-clients-as-an-msp-who-serves-smbs</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/how-to-implement-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/how-to-test-for-sql-injection</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/iis-logs-analysis</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/internal-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/it-compliance-consulting-services</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/it-compliance-services</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/it-compliance-services-near-me</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/local-group-policy-editor</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/managed-security-service-pricing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/managed-security-services-for-small-business</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/managed-services</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/managed-services-provider</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/managed-siem-service</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/mobile-app-pentest</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/msp-cybersecurity-sales-playbook</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/msp-offensive-security</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/msp-pentesting-in-portland</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/msp-pentesting-x-hacker-analytics-partnership-announcement</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/mssp-services</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/network-architecture-review</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/network-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/network-security-assessments</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/network-security-audit</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/network-security-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/network-segmentation-best-practices</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/nist-800-53</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/online-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/operational-level-agreement</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/outsourced-pentesting-for-cpas</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/outsourcing-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/owasp-mobile-top-10</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/owasp-zap-automated-scan</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pci-compliance-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pen-test-report-template</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pen-testing-methodology</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-and-vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-best-practices</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-firms</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-letter-of-attestation-sample</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-price</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-price-sheet</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-process</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-report-template</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-report-templates</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/penetration-testing-training</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentest-asap</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentest-attestation-statement</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentest-partner</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentest-partner-channel-it</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-checking-the-box-automated-vs-manual-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-for-audits</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-for-managed-service-providers</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-for-resellers</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-for-the-channel</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-smb-compliance</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-soc2-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentesting-what-works-what-doesnt-and-what-changed-in-2025</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/pentests-for-msps-how-our-white-labeling-works</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/phases-of-a-penetration-test</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/phishing-vs-spear-phishing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/physical-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ptaas-for-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/public-key-and-private-key-encryption</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/purple-team-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ransomware-prevention-best-practices</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/rapid-7-penetration-testing-price</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/red-team-exercises</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/remediation-of-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/reseller-pricing-math-msp-pentesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/risk-and-compliance-tools</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/secure-testing-services</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/security-in-layers</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/security-testing-for-mobile-apps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/security-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc-2-audit-requirements</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc-2-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc-2-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc-2-pentest</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc-2-security-controls-list</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc-2-type-2-vs-type-1</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc2-cybersecurity-requirements-in-2025</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/soc2-readiness-for-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/ssl-vpn-vs-ipsec-vpn</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/suricata-intrusion-detection-system</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/third-party-risk-management-process</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/threat-and-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/top-managed-security-service-providers</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/types-of-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/types-of-phishing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/vendor-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/vendor-security-assessment-questionnaire</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/vulnerability-assessment-vs-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/vulnerability-management-best-practices</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/web-app-pentesting-msps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/web-application-security-testing-tools</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-are-snmp-traps</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-auditors-look-for-pentest-report</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-a-cyber-kill-chain</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-a-letter-of-attestation</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-a-rogue-access-point</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-a-script-kiddie</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-a-vulnerability-assessment</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-a-white-label-service</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-black-box-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-ceh-certification</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-credential-harvesting</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-ethical-hacking</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-grey-box-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-ntlm</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-owasp-top-10</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-packet-switching</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-is-snort</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/what-to-know-before-you-get-a-pentest-quote</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/white-box-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/white-label-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.msppentesting.com/blog-posts/windows-update-logs</loc>
    </url>
</urlset>