<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap_generator/default/sitemap.xsl"?>
<!--Generated by the Simple XML Sitemap Drupal module: https://drupal.org/project/simple_sitemap.-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://yekta-it.de/</loc>
  <lastmod>2025-12-14T13:37:09+01:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>1.0</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_hacker%2C-person.png</image:loc>
   <image:caption>Hacker Person</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_shield%2C-protection%2C-laptop%2C-antivirus%2C-security.png</image:loc>
   <image:caption>Security Monitoring</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_Autonomous%2C-autonomous-car%2C-autopilot%2C-car%2C-smart.png</image:loc>
   <image:caption>Auto</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/EcommercE_cybersecurity_Protection_0.webp</image:loc>
   <image:caption>E-Commerce Cybersecurity Shield</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Yekta_IT_0.webp</image:loc>
   <image:caption>Security Monitoring | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ein-monat-log4j-was-haben-wir-gelernt</loc>
  <lastmod>2026-02-20T14:01:18+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2022-01/banner_log4j.png</image:loc>
   <image:caption>Log4j Banner</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2022-01/content_log4_small.jpg</image:loc>
   <image:caption>Apache Log4j</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2022-01/content_transparelog4j_nt.png</image:loc>
   <image:caption>Log4j Attack Detection</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/drupal-vs-wordpress-vs-joomla-vs-typo3-ultimativer-cms-vergleich-2024</loc>
  <lastmod>2024-10-31T10:42:07+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Website_CMS_0.jpeg</image:loc>
   <image:caption>Website CMS</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Website_CMS.jpeg</image:loc>
   <image:caption>Website CMS</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/was-ist-ein-pentest-und-wie-wird-er-durchgefuehrt</loc>
  <lastmod>2024-04-08T15:25:35+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/IT_Security_Hacker_web.jpeg</image:loc>
   <image:caption>IT Security Hacker</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/IT_Security_Hacker_web_0.jpeg</image:loc>
   <image:caption>IT Security Hacker Pentest</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/offensive-vs-defensive-security-blue-teaming-und-red-teaming-erklaert</loc>
  <lastmod>2024-02-25T10:08:07+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Offensive_Defensive_Security.jpg</image:loc>
   <image:caption>Offensive Defensive Security</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Offensive_Defensive_Security_0.jpg</image:loc>
   <image:caption>Offensive Defensive Security</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/penetrationstest-erklaerung-vorgehen-pentest-kosten-rechner-beispiele</loc>
  <lastmod>2026-03-05T00:03:20+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Hacker.jpeg</image:loc>
   <image:caption>Hacker</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Hacker_0.jpeg</image:loc>
   <image:caption>Hacker</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/professionelle-drupal-agentur-aus-dortmund-massgeschneiderte-web-loesungen</loc>
  <lastmod>2026-01-16T12:49:23+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Dortmund_0.jpeg</image:loc>
   <image:caption>Dortmund</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-08/Dortmund.jpeg</image:loc>
   <image:caption>Dortmund</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/welches-sind-die-relevanten-cybersecurity-standards-frameworks-und-zertifizierungen</loc>
  <lastmod>2024-07-30T07:45:28+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-09/Cybersecurity_Normen.png</image:loc>
   <image:caption>Cybersecurity Normen | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-09/Cybersecurity_Normen_0.png</image:loc>
   <image:caption>Cybersecurity Normen | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/einfuehrung-den-can-bus-grundlagen-und-funktionsweise</loc>
  <lastmod>2025-08-04T12:35:28+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/AdobeStock_595644322.jpeg</image:loc>
   <image:caption>CAN-Bus | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/AdobeStock_595644322_0.jpeg</image:loc>
   <image:caption>CAN-Bus</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/von-logstash-bis-kibana-ein-leitfaden-fuer-einsteiger-die-welt-des-elastic-stack</loc>
  <lastmod>2026-02-24T10:26:43+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/Network%20operations%20center_Yekta_IT_web.jpeg</image:loc>
   <image:caption>Network operations center</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/Network%20operations%20center_Yekta_IT_web_0.jpeg</image:loc>
   <image:caption>Network Operation Center</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/vattek-das-framework-fuer-automotive-rail-cybersecurity</loc>
  <lastmod>2025-06-13T15:16:30+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/Network%20operations%20center_Yekta_IT_web.jpeg</image:loc>
   <image:caption>Network operations center</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/AdobeStock_595644322_0.jpeg</image:loc>
   <image:caption>CAN-Bus</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/pentest-anbieter-deutschland-ihr-umfassender-leitfaden-zur-auswahl-des-richtigen-partners</loc>
  <lastmod>2026-03-25T15:38:56+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-12/Ethical_Hacker_Yekta_IT_web.jpeg</image:loc>
   <image:caption>Ethical Hacker | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-12/Ethical_Hacker_Yekta_IT_web_1.jpeg</image:loc>
   <image:caption>Ethical Hacker | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/der-menschliche-faktor-der-cybersicherheit-staerken-und-schwaechen</loc>
  <lastmod>2026-01-07T00:20:33+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-12/Sta%CC%88rken_Schwa%CC%88chen_Yekta_IT_web.jpeg</image:loc>
   <image:caption>Stärken Schwächen | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-12/Sta%CC%88rken_Schwa%CC%88chen_Yekta_IT_web_0.jpeg</image:loc>
   <image:caption>Stärken Schwächen | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/nis2-umsetzungsgesetz-2026-der-ultimative-guide-fuer-unternehmen</loc>
  <lastmod>2026-03-25T06:14:45+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-01/NIS2_Richtlinie_web.jpeg</image:loc>
   <image:caption>NIS 2 Richtlinie | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-01/NIS2_Richtlinie_web_0.jpeg</image:loc>
   <image:caption>NIS 2 Richtlinie | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/cybersecurity-im-automobilbereich-neue-bedrohungen</loc>
  <lastmod>2024-02-15T13:08:43+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Automotive_Cybersecurity%20-%20Yekta%20IT%20-%20web.jpeg</image:loc>
   <image:caption>Automotive_Cybersecurity - Yekta IT </image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Automotive_Cybersecurity%20-%20Yekta%20IT%20-%20web_0.jpeg</image:loc>
   <image:caption>Automotive_Cybersecurity - Yekta IT </image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/essentielle-cybersecurity-strategien-fuer-kmus-praktischer-leitfaden</loc>
  <lastmod>2025-07-22T11:46:45+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Moderne_produktion_Fabrik_Digital_Yekta_IT_web_0.jpeg</image:loc>
   <image:caption>Moderne Fabrik - KMU</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Moderne_produktion_Fabrik_Digital_Yekta_IT_web.jpeg</image:loc>
   <image:caption>Moderne Fabrik - KMU</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/aufstieg-von-iot-und-die-auswirkungen-auf-die-cybersicherheit</loc>
  <lastmod>2025-06-16T15:23:19+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Smarthome_IoT_Yekta_IT_web.jpeg</image:loc>
   <image:caption>Smarthome IoT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Smarthome_IoT_Yekta_IT_web_0.jpeg</image:loc>
   <image:caption>Smarthome IoT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/wordpress-sicherheit-erhoehen-plugins-tipps-pentests</loc>
  <lastmod>2024-05-14T12:04:15+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Wordpress_Sicherheit_Pentest_Yekta_IT.webp</image:loc>
   <image:caption>Wordpress Sicherheit Pentest Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Wordpress_Sicherheit_Pentest_Yekta_IT_0.webp</image:loc>
   <image:caption>Wordpress Sicherheit Pentest Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/forschungsprojekt-finesse-unser-beitrag-zu-mehr-fahrzeugsicherheit</loc>
  <lastmod>2024-06-13T18:06:16+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/FINESSE_Automotive_Rail_Yekta_IT_header.png</image:loc>
   <image:caption>FINESSE Automotive Rail Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/FINESSE_Automotive_Rail_YektaIT.png</image:loc>
   <image:caption>FINESSE - Automotive - Railway Security - Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/security-operations-center-multi-modal-transport-systems</loc>
  <lastmod>2024-09-30T17:56:00+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/FINESSE_Automotive_Rail_Yekta_IT_header.png</image:loc>
   <image:caption>FINESSE Automotive Rail Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Vehicle_Security_Operations_Center_ARES_2022_Yekta.png</image:loc>
   <image:caption>Security Operations Center for Multi-Modal Transport Systems  Ali Recai Yekta (Yekta IT GmbH, Germany)</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Vehicle_Security_Operations_Center_ARES_2022_YektaIT.png</image:loc>
   <image:caption>Security Operations Center for Multi Modal Transport Systems - ARES 2022 - Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/vattek-framework-auf-der-acm-cscs-konferenz-vorgestellt</loc>
  <lastmod>2024-08-10T11:01:31+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/FINESSE_Automotive_Rail_Yekta_IT_header.png</image:loc>
   <image:caption>FINESSE Automotive Rail Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/vattek_poland_railway_yektait_0.png</image:loc>
   <image:caption>Hackers use radio signals to bring over 20 trains to a standstill in a cyber attack on the rail network in Poland - VATT&amp;EK - YektaIT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/ACM_CSCS_VATTEK_YektaIT_0.jpg</image:loc>
   <image:caption>ACM CSCS - VATT&amp;EK - Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/die-gefahren-von-aws-cognito-eine-sicherheitsanalyse</loc>
  <lastmod>2026-02-24T10:26:57+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-06/AWS_Cognito_Security_0.webp</image:loc>
   <image:caption>AWS Cognito Security | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-06/AWS_Cognito_Security.webp</image:loc>
   <image:caption>AWS Cognito Security | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/yektrain-der-vermutlich-kleinste-hackbare-zug-der-welt</loc>
  <lastmod>2024-09-19T08:52:10+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-09/header_yektTrain.png</image:loc>
   <image:caption>yektTrain</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-09/YekTrain_2024_header_0.jpg</image:loc>
   <image:caption>YekTrain - Rail Security by Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/interner-soc-vs-managed-soc-vs-hybrid-ein-ausfuehrlicher-ratgeber</loc>
  <lastmod>2025-12-13T00:24:02+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-11/SOC_Yekta_IT_web.jpeg</image:loc>
   <image:caption>SOC | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-11/SOC_Yekta_IT_web_0.jpeg</image:loc>
   <image:caption>SOC | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit-fuer-kmu-die-unsichtbare-gefahr-der-industrie</loc>
  <lastmod>2025-12-13T00:23:53+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_security_0.png</image:loc>
   <image:caption>IT-Sicherheit</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-12/AR_Yekta_ITStag.jpg</image:loc>
   <image:caption>IT-Sicherheitstag NRW - OT-Security Vortrag - Ali Recai Yekta</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/bluetooth-low-energy-hacking-101</loc>
  <lastmod>2025-04-24T09:51:01+02:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-02/Bluetooth_Hacking_Yekta_IT.png</image:loc>
   <image:caption>Bluetooth Hacking Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-02/Bluetooth_Hacking_Yekta_IT_0.png</image:loc>
   <image:caption>Bluetooth Hacking Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/automotive-cybersecurity-unser-innovativer-demonstrator-fuer-praxisnahe-fahrzeugsicherheit</loc>
  <lastmod>2025-12-13T00:23:45+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/FINESSE_Automotive_Rail_Yekta_IT_header.png</image:loc>
   <image:caption>FINESSE Automotive Rail Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-06/yekcar_automotive_security_demonstrator.jpg</image:loc>
   <image:caption>YekCar  Automotive Security Demonstrator</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/yekcity-premiere-auf-der-it-sa-2025-nuernberg</loc>
  <lastmod>2025-12-15T09:05:01+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/20251006_Yekta_IT_it-sa.jpg</image:loc>
   <image:caption>Yekta It auf der it-sa 2025</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/20251006_Yekta_IT_it-sa_0.jpg</image:loc>
   <image:caption>YekCity it-sa 2025</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/yekcity-auf-dem-it-sicherheitstag-nrw-2025-dortmund</loc>
  <lastmod>2026-03-05T00:04:33+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_its_2025.jpeg</image:loc>
   <image:caption>YekCity IT-Sicherheitstag NRW 2025 in Dortmund</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_its_2025_0.jpeg</image:loc>
   <image:caption>YekCity</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/yekta-it-auf-der-nationalen-konferenz-it-sicherheitsforschung-2025</loc>
  <lastmod>2026-02-04T23:49:07+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/itskonf2025_yektait_teams.png</image:loc>
   <image:caption>Yekta IT auf der Nationalen Konferenz IT-Sicherheitsforschung 2025</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekteam.jpg</image:loc>
   <image:caption>Yekta IT auf der Nationalen Konferenz IT-Sicherheitsforschung 2025</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/yekta-it-auf-der-securware-2025-barcelona</loc>
  <lastmod>2025-12-15T15:01:04+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/securware2025_yektait_sec.png</image:loc>
   <image:caption>Yekta IT auf der SECURWARE 2025 in Barcelona</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/iaria3.jpeg</image:loc>
   <image:caption>Yekta IT auf der SECURWARE 2025 in Barcelona</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/vehicle-security-monitoring-fuer-kritische-infrastrukturen-critis-2025</loc>
  <lastmod>2025-12-16T17:59:05+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/critis2025_yektait.png</image:loc>
   <image:caption>CRITIS2025 - Vehicle Security Monitoring für kritische Infrastrukturen</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/critis_yekta_it.jpeg</image:loc>
   <image:caption>CRITIS2025 - Vehicle Security Monitoring für kritische Infrastrukturen</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/yekta-it-im-advanced-trainlab-cybersicherheit-fuer-schienenfahrzeuge</loc>
  <lastmod>2025-12-15T15:19:35+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yektait_atl_rail_security.png</image:loc>
   <image:caption>Yekta IT im Advanced Trainlab: Cybersicherheit für Schienenfahrzeuge</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yektait_atl_rail_security2.png.jpg</image:loc>
   <image:caption>Yekta IT im Advanced Trainlab: Cybersicherheit für Schienenfahrzeuge</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/yekta-it-stellt-auf-dem-cps-sec-2025-avignon-uds-paper-vor</loc>
  <lastmod>2025-12-16T17:58:17+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/1757657621308.jpeg</image:loc>
   <image:caption>Yekta IT auf der CPS-Sec 2025 in Avignon</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/1757657621308_0.jpeg</image:loc>
   <image:caption>Yekta IT auf der CPS-Sec 2025 in Avignon</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog/koordinierte-cyberangriffe-auf-polens-energiesektor</loc>
  <lastmod>2026-03-23T17:11:21+01:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/energieversorgung_netzbetreiber.png</image:loc>
   <image:caption>Energieversorgugn Netzbetreiber</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/Kraftwerk_0.png</image:loc>
   <image:caption>Kraftwerk</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/home</loc>
  <lastmod>2025-12-14T13:37:09+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_hacker%2C-person.png</image:loc>
   <image:caption>Hacker Person</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_shield%2C-protection%2C-laptop%2C-antivirus%2C-security.png</image:loc>
   <image:caption>Security Monitoring</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_Autonomous%2C-autonomous-car%2C-autopilot%2C-car%2C-smart.png</image:loc>
   <image:caption>Auto</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/EcommercE_cybersecurity_Protection_0.webp</image:loc>
   <image:caption>E-Commerce Cybersecurity Shield</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Yekta_IT_0.webp</image:loc>
   <image:caption>Security Monitoring | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/schuetzen-sie-ihr-unternehmen-vor-cyberangriffen</loc>
  <lastmod>2023-12-19T11:09:46+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-12/KMU_Cybersecurity_Check_Darstellung_500x400.png</image:loc>
   <image:caption>KMu Cybersecurity Check | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/regierung_ngo_icon.png</image:loc>
   <image:caption>Regierung &amp; NGO Icon</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/technologie_icon.png</image:loc>
   <image:caption>Technologie Icon</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/bank_icon.png</image:loc>
   <image:caption>Bank</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/ecommerce_icon_1.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/cyberrisikocheck-nach-din-spec-27076-fuer-kmu</loc>
  <lastmod>2024-07-31T12:56:23+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-06/CyberRisikoCheck_logo_q_Yekta_IT.jpg</image:loc>
   <image:caption>CyberRisikoCheck DIN SPEC 27076</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_seo-search-engine-optimization-underwriting.png</image:loc>
   <image:caption>SEO</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/industrie_icon.png</image:loc>
   <image:caption>Industrie Icon</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_shield%2C-protection%2C-laptop%2C-antivirus%2C-security.png</image:loc>
   <image:caption>Security Monitoring</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_growth-traffic-analysis-laptop-report.png</image:loc>
   <image:caption>SEA</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/kontakt</loc>
  <lastmod>2023-11-17T23:20:13+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_contact_0.png</image:loc>
   <image:caption>Kontakt</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/phone-icon.png</image:loc>
   <image:caption>phone</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/address-icon.png</image:loc>
   <image:caption>address</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/mail-icon.png</image:loc>
   <image:caption>email</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests</loc>
  <lastmod>2026-03-20T21:51:46+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_security_0.png</image:loc>
   <image:caption>IT-Sicherheit</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/web_pentest_100.png</image:loc>
   <image:caption>Web Pentesting</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/app_pentesting_100.png</image:loc>
   <image:caption>Mobile App Pentesting</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/infrastruktur_pentest_100.png</image:loc>
   <image:caption>Infrastruktur Pentesting</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests/pentest-fuer-webanwendungen-apis</loc>
  <lastmod>2026-03-21T16:43:55+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_security2_0.png</image:loc>
   <image:caption>IT-Sicherheit</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_notebooksec.png</image:loc>
   <image:caption>IT-Sicherheit</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_web_resp.png</image:loc>
   <image:caption>Web Pentesting</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/kennenlernen.png</image:loc>
   <image:caption>Kennenlernen</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/information-gathering.png</image:loc>
   <image:caption>Information Gathering</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/exploitation.png</image:loc>
   <image:caption>Exploitation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/dokumentation.png</image:loc>
   <image:caption>Dokumentation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/praesentation.png</image:loc>
   <image:caption>Präsentation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/retest.png</image:loc>
   <image:caption>Retest</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests/mobile-app-pentesting</loc>
  <lastmod>2026-03-21T16:44:41+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_appsec.png</image:loc>
   <image:caption>Mobile App Security</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_appsec.png</image:loc>
   <image:caption>Mobile App Entwicklung</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_appsec2.png</image:loc>
   <image:caption>Mobile App Entwicklung</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/kennenlernen.png</image:loc>
   <image:caption>Kennenlernen</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/information-gathering.png</image:loc>
   <image:caption>Information Gathering</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/exploitation.png</image:loc>
   <image:caption>Exploitation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/dokumentation.png</image:loc>
   <image:caption>Dokumentation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/praesentation.png</image:loc>
   <image:caption>Präsentation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/retest.png</image:loc>
   <image:caption>Retest</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/web-entwicklung-sichere-und-leistungsstarke-websites-fuer-ihren-erfolg</loc>
  <lastmod>2024-11-09T17:23:06+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_webdev.png</image:loc>
   <image:caption>Web Entwicklung</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_web_resp_0.png</image:loc>
   <image:caption>PWA App Development</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/timeline-vision.png</image:loc>
   <image:caption>timeline-vision</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/timeline-product.png</image:loc>
   <image:caption>product</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/timeline-design.png</image:loc>
   <image:caption>timeline-design</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/timeline-coding.png</image:loc>
   <image:caption>timeline-coding</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/timeline-start-up.png</image:loc>
   <image:caption>timeline-start-up</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/timeline-optimization.png</image:loc>
   <image:caption>timeline-optimization</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/monitor%20%282%29.png</image:loc>
   <image:caption>monitor</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/pay-per-click.png</image:loc>
   <image:caption>pay-per-click</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/landing-page.png</image:loc>
   <image:caption>landing-page</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/shield.png</image:loc>
   <image:caption>shield</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/search-engine%20%281%29.png</image:loc>
   <image:caption>search-engine</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests/infrastruktur-pentesting</loc>
  <lastmod>2026-03-21T16:45:01+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_security_0.png</image:loc>
   <image:caption>IT-Sicherheit</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_hacking.png</image:loc>
   <image:caption>IT-Sicherheit</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/content_infrastruktur.png</image:loc>
   <image:caption>Infrastruktur Pentesting</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/kennenlernen.png</image:loc>
   <image:caption>Kennenlernen</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/information-gathering.png</image:loc>
   <image:caption>Information Gathering</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/exploitation.png</image:loc>
   <image:caption>Exploitation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/dokumentation.png</image:loc>
   <image:caption>Dokumentation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/praesentation.png</image:loc>
   <image:caption>Präsentation</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/retest.png</image:loc>
   <image:caption>Retest</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ueber-uns</loc>
  <lastmod>2026-03-01T15:23:21+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Yekta_IT_Team_all.png</image:loc>
   <image:caption>Yekta IT Team alle</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/cenk2.png</image:loc>
   <image:caption>Cenk Yekta</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-12/ARY_profilbild.jpg</image:loc>
   <image:caption>Ali Recai Yekta | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-07/erhan.jpg</image:loc>
   <image:caption>Erhan Yekta</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Mucahid_Yekta_IT.jpg</image:loc>
   <image:caption>Mucahid | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/branchen-referenzen</loc>
  <lastmod>2026-02-19T15:25:29+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_referenzen.png</image:loc>
   <image:caption>Projekt Referenzen</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Yekta_IT_0.webp</image:loc>
   <image:caption>Security Monitoring | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/Kraftwerk_0.png</image:loc>
   <image:caption>Kraftwerk</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/EcommercE_cybersecurity_Protection_0.webp</image:loc>
   <image:caption>E-Commerce Cybersecurity Shield</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Education.webp</image:loc>
   <image:caption>Security Monitoring Education</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/blog</loc>
  <lastmod>2023-10-25T12:51:50+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_blog.jpg</image:loc>
   <image:caption>Blog</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/suche</loc>
  <lastmod>2020-11-14T17:02:07+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_suche.png</image:loc>
   <image:caption>Suche</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/datenschutz</loc>
  <lastmod>2026-01-08T13:30:56+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_datenschutz.png</image:loc>
   <image:caption>Datenschutz</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/impressum</loc>
  <lastmod>2024-04-08T14:05:51+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_datenschutz.png</image:loc>
   <image:caption>Datenschutz</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/soc-siem-beratung-fuer-ganzheitliche-sicherheitsueberwachung</loc>
  <lastmod>2026-03-20T21:53:06+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2020-11/header_appsec.png</image:loc>
   <image:caption>Mobile App Security</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Yekta_IT_0.webp</image:loc>
   <image:caption>Security Monitoring | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Education.webp</image:loc>
   <image:caption>Security Monitoring Education</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/zertifizierungen</loc>
  <lastmod>2023-10-25T10:56:31+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/kmu-cybersecurity-check-von-yekta-it</loc>
  <lastmod>2024-01-28T14:10:05+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit</loc>
  <lastmod>2026-03-20T21:52:20+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2023-11/Network%20operations%20center_Yekta_IT_web_0.jpeg</image:loc>
   <image:caption>Network Operation Center</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_hacker%2C-person.png</image:loc>
   <image:caption>Hacker Person</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_shield%2C-protection%2C-laptop%2C-antivirus%2C-security.png</image:loc>
   <image:caption>Security Monitoring</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_password-fishing%2C-password%2C-fishing.png</image:loc>
   <image:caption>Security Awareness Phishing</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/onlinemarketing-seo-sea</loc>
  <lastmod>2024-02-29T18:51:23+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-01/Digitalmarketing_web_Yekta_IT.jpeg</image:loc>
   <image:caption>Digitalmarketing SEO SEA | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-01/Digitalmarketing_web_Yekta_IT_0.jpeg</image:loc>
   <image:caption>Digitalmarketing SEO SEA | Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_seo-search-engine-optimization-underwriting.png</image:loc>
   <image:caption>SEO</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_growth-traffic-analysis-laptop-report.png</image:loc>
   <image:caption>SEA</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_local-seo-globe.png</image:loc>
   <image:caption>Local SEO</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/kmu-it-sicherheit-quickcheck-von-yekta-it</loc>
  <lastmod>2024-01-31T10:16:17+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/effektives-security-awareness-training-fuer-verbesserte-it-sicherheit</loc>
  <lastmod>2026-03-20T21:53:35+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/cybersecurity_seminar_yekta_it_web.jpeg</image:loc>
   <image:caption>Cybersecurity Awareness Trainings by Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/cybersecurity_seminar_yekta_it_web.jpeg</image:loc>
   <image:caption>Cybersecurity Seminar by Yekta IT</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/Icon_hacker%2C-person.png</image:loc>
   <image:caption>Hacker Person</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-07/icon_teaching.png</image:loc>
   <image:caption>Schulung</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-07/Icon_password-fishing%2C-password%2C-fishing.png</image:loc>
   <image:caption>Phishing Simulation</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit</loc>
  <lastmod>2026-03-21T18:15:17+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-02/OT-Security_Railway.webp</image:loc>
   <image:caption>OT-Security</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/referenzen/fallstudie-handwerk-mehr-kunden-durch-professionelle-webseite-online-marketing</loc>
  <lastmod>2024-03-02T13:57:27+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Malermeister_Buchardt.png</image:loc>
   <image:caption>Fallstudie Malermeister Buchardt | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/referenzen/fallstudie-seminaranbieter-mehr-buchungen-durch-moderne-webseite</loc>
  <lastmod>2024-03-02T16:36:45+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/dgb_bw_nrw_webseite.png</image:loc>
   <image:caption>Fallstudie DGB-Bildungswerk NRW | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/referenzen/fallstudie-sportverein-mehr-mitglieder-durch-eine-topmoderne-webseite</loc>
  <lastmod>2024-03-02T16:54:48+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/budokan.png</image:loc>
   <image:caption>Budokan Sportcenter Dortmund | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/fallstudie-e-commerce-unternehmen-wie-pentests-cyberangrife-auf-den-mittelstand-verhindern</loc>
  <lastmod>2024-03-02T18:09:11+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/EcommercE_cybersecurity_Protection.webp</image:loc>
   <image:caption>E-Commerce Cybersecurity Shield</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/referenzen/fallstudie-security-monitoring-kritis-so-schuetzt-ein-grosskonzern-sein-netzwerk-mit-einem-soc</loc>
  <lastmod>2024-03-02T19:08:35+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-03/Security_Monitoring_Yekta_IT.webp</image:loc>
   <image:caption>Security Monitoring Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/referenzen/fallstudie-bildung-schutz-vor-cyberangriffen-mit-professionellem-security-monitoring</loc>
  <lastmod>2024-03-02T19:25:27+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/pt</loc>
  <lastmod>2026-04-01T10:15:57+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/live-hacking-cyberangriffe-erlebbar-machen-und-sensibilisieren</loc>
  <lastmod>2024-07-23T13:54:08+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/railway-security</loc>
  <lastmod>2024-09-04T14:49:42+02:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-08/bahn.png</image:loc>
   <image:caption>Rail Security</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/phishing-simulationen-fuer-unternehmen</loc>
  <lastmod>2024-11-09T15:50:14+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://yekta-it.de/foerderungen-fuer-it-sicherheit-und-digitalisierung</loc>
  <lastmod>2025-12-13T00:24:13+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-11/foerderung_0.png</image:loc>
   <image:caption>Förderungen für Beratungen bei Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests/physical-penetration-testing-effektiver-schutz-fuer-kritische-infrastrukturen-und</loc>
  <lastmod>2026-03-21T16:45:34+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2024-11/physical_pentest_yekta_it.png</image:loc>
   <image:caption>Physical Pentest | Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests/ai-penetrationstests-audits</loc>
  <lastmod>2026-03-21T16:45:54+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-03/AI_KI_Pentest_Yekta_IT.jpg</image:loc>
   <image:caption>AI Pentest</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/penetrationstests/cloud-pentesting-professionelle-sicherheitstests-fuer-aws-azure-google-cloud</loc>
  <lastmod>2026-03-21T16:45:18+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/Cloud_Security_Yekta_IT.jpg</image:loc>
   <image:caption>Cloud Security by Yekta IT</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit/ot-forschung-security-labor</loc>
  <lastmod>2026-03-21T18:03:52+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_ot_Security_training_labor.jpg</image:loc>
   <image:caption>YekCity - OT Security Training Labor</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/2025_YekCity.jpg</image:loc>
   <image:caption>YekCity</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/YekCar.JPEG</image:loc>
   <image:caption>YekCar</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/YekTrain_2024_3.jpg</image:loc>
   <image:caption>YekTrain</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/yekcity-ot-security-trainingsplattform-fuer-kritische-infrastrukturen</loc>
  <lastmod>2025-12-15T14:27:45+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_ot_Security_training_labor.jpg</image:loc>
   <image:caption>YekCity - OT Security Training Labor</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit/ot-penetrationstest</loc>
  <lastmod>2026-03-20T21:54:02+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_ot_Security_training_labor.jpg</image:loc>
   <image:caption>YekCity - OT Security Training Labor</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit/ot-risk-assessment-risiken-kennen-bevor-sie-zum-problem-werden</loc>
  <lastmod>2026-03-20T21:55:41+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_ot_Security_training_labor.jpg</image:loc>
   <image:caption>YekCity - OT Security Training Labor</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit/ot-soc-aufbau-angriffe-erkennen-bevor-schaden-entsteht</loc>
  <lastmod>2026-03-21T18:03:08+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_ot_Security_training_labor.jpg</image:loc>
   <image:caption>YekCity - OT Security Training Labor</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit/ot-security-training-wissen-aufbauen-ernstfall-ueben</loc>
  <lastmod>2026-03-20T21:54:55+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2025-12/yekcity_ot_Security_training_labor.jpg</image:loc>
   <image:caption>YekCity - OT Security Training Labor</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/branchen/ot-sicherheit-fuer-energieversorger-netzbetreiber</loc>
  <lastmod>2026-02-19T15:00:19+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/energieversorgung_netzbetreiber.png</image:loc>
   <image:caption>Energieversorgugn Netzbetreiber</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/ot-sicherheit-fuer-energieversorger-netzbetreiber/fallstudie-ot-penetrationstest-einem-kraftwerksumfeld</loc>
  <lastmod>2026-02-19T14:54:09+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-02/Kraftwerk.png</image:loc>
   <image:caption>Kraftwerk</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://yekta-it.de/it-sicherheit/nis-2-beratung-fuer-unternehmen-kritis-betreiber</loc>
  <lastmod>2026-03-21T16:43:06+01:00</lastmod>
  <changefreq>weekly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://yekta-it.de/sites/default/files/2026-03/NIS2_Beratung_by_Yekta_IT.jpg</image:loc>
   <image:caption>NIS2 Beratung</image:caption>
  </image:image>
 </url>
</urlset>
