<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml"
        xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:introduction-to-online-data-security/v/how-not-to-get-hacked-introduction</loc>
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:introduction-to-online-data-security/v/how-not-to-get-hacked-introduction" />
        
        <lastmod>2024-01-19T15:52:04.591125233Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="how-not-to-get-hacked-introduction">
            <Attribute name="title">How Not To Get Hacked: Introduction</Attribute>
            <Attribute name="description">Shelli Strand and Len Henry kick off our video series on hacking and cybersecurity! In this series, we will explore the world of hacking, from common scams to best security practices, and provide you with valuable tips and knowledge to help protect yourself and your personal information from potential cyber threats.&#xA;</Attribute>
            <Attribute name="author">Code.org</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>How Not To Get Hacked: Introduction</video:title>
            <video:description>Shelli Strand and Len Henry kick off our video series on hacking and cybersecurity! In this series, we will explore the world of hacking, from common scams to best security practices, and provide you with valuable tips and knowledge to help protect yourself and your personal information from potential cyber threats.&#xA;</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/4J6FNRft9pQ.mp4/4J6FNRft9pQ.mp4</video:player_loc>
            <video:duration>68</video:duration>
            <video:category>User authentication methods</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/c6-informatica-si-tic/x20cc5aef933fa707:comunicare-prin-internet/x20cc5aef933fa707:securitate-online/a/strong-passwords" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:phuong-thuc-xac-thuc-nguoi-dung-may-tinh-va-internet/a/strong-passwords" />
        
        <lastmod>2021-04-29T07:56:20Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="strong-passwords">
            <Attribute name="title">Strong passwords</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/v/how-not-to-get-hacked-passwords</loc>
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/v/how-not-to-get-hacked-passwords" />
        
        <lastmod>2024-01-19T15:52:04.591125233Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="how-not-to-get-hacked-passwords">
            <Attribute name="title">How Not To Get Hacked: Passwords</Attribute>
            <Attribute name="description">Today, protecting your online accounts with strong passwords is more important than ever. In this video, we&#39;ll go over some best practices for creating and managing your passwords, as well as tips on how to avoid getting hacked.&#xA;&#xA;Featuring &#xA;Shelli Strand Senior Director Microsoft Security&#xA;Emily Schecter Product Manager, Chrome Security Team&#xA;Len Henry Amazon Web Services Engineer&#xA;</Attribute>
            <Attribute name="author">Code.org</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>How Not To Get Hacked: Passwords</video:title>
            <video:description>Today, protecting your online accounts with strong passwords is more important than ever. In this video, we&#39;ll go over some best practices for creating and managing your passwords, as well as tips on how to avoid getting hacked.&#xA;&#xA;Featuring &#xA;Shelli Strand Senior Director Microsoft Security&#xA;Emily Schecter Product Manager, Chrome Security Team&#xA;Len Henry Amazon Web Services Engineer&#xA;</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/qLMIK5YVgfA.mp4/qLMIK5YVgfA.mp4</video:player_loc>
            <video:duration>110</video:duration>
            <video:category>User authentication methods</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/multi-factor-authentication</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="de"
                    href="https://de.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="ro"
                    href="https://ro.khanacademy.org/computing/c6-informatica-si-tic/x20cc5aef933fa707:comunicare-prin-internet/x20cc5aef933fa707:securitate-online/a/multi-factor-authentication" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:phuong-thuc-xac-thuc-nguoi-dung-may-tinh-va-internet/a/multi-factor-authentication" />
        
        <lastmod>2021-04-29T07:55:30Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="multi-factor-authentication">
            <Attribute name="title">Multi-factor authentication</Attribute>
            
            
            <Attribute name="type">article</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/v/how-not-to-get-hacked-authentication-and-device-locks</loc>
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/v/how-not-to-get-hacked-authentication-and-device-locks" />
        
        <lastmod>2024-01-19T15:52:04.591125233Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="how-not-to-get-hacked-authentication-and-device-locks">
            <Attribute name="title">How Not To Get Hacked: Authentication and Device Locks</Attribute>
            <Attribute name="description">In this video, we&#39;ll explore two essential security measures – two-factor authentication and device locks – and discuss how they can help keep your personal information safe.&#xA;</Attribute>
            <Attribute name="author">Code.org</Attribute>
            <Attribute name="type">video</Attribute>
            
            </DataObject>
        </PageMap>
        
        <video:video>
            <video:thumbnail_loc>https://cdn.kastatic.org/googleusercontent/ZCdwTudJg6e6n-P2gsaUborP4izvMsGo71pvEVlX9dNYWcLXcP7VHkWpn2grt4TUP1KoJLQP9NswyHBuBLSFTBw</video:thumbnail_loc>
            <video:title>How Not To Get Hacked: Authentication and Device Locks</video:title>
            <video:description>In this video, we&#39;ll explore two essential security measures – two-factor authentication and device locks – and discuss how they can help keep your personal information safe.&#xA;</video:description>
            <video:player_loc>https://cdn.kastatic.org/ka-youtube-converted/l9mEd8LOMl8.mp4/l9mEd8LOMl8.mp4</video:player_loc>
            <video:duration>98</video:duration>
            <video:category>User authentication methods</video:category>
        </video:video>
        
    </url>
    
    <url>
        <loc>https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/e/user-authentication-methods</loc>
        
        <xhtml:link rel="alternate" hreflang="bg"
                    href="https://bg.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="da"
                    href="https://da.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="en"
                    href="https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="es"
                    href="https://es.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="fr"
                    href="https://fr.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="hu"
                    href="https://hu.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="pl"
                    href="https://pl.khanacademy.org/computing/ap-computer-science-principles/x2d2f703b37b450a3:online-data-security/x2d2f703b37b450a3:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="pt"
                    href="https://pt.khanacademy.org/college-careers-more/internet-safety/xef9bb6e081c9f4ff:online-data-security/xef9bb6e081c9f4ff:user-authentication-methods/e/user-authentication-methods" />
        
        <xhtml:link rel="alternate" hreflang="vi"
                    href="https://vi.khanacademy.org/computing/may-tinh-va-internet/x048967ab7b3223c2:bao-mat-du-lieu-mang-may-tinh-va-internet/x048967ab7b3223c2:phuong-thuc-xac-thuc-nguoi-dung-may-tinh-va-internet/e/user-authentication-methods" />
        
        <lastmod>2021-04-29T07:58:10Z</lastmod>
        
        <PageMap xmlns="http://www.google.com/schemas/sitemap-pagemap/1.0">
            <DataObject type="document" id="user-authentication-methods">
            <Attribute name="title">User authentication methods</Attribute>
            <Attribute name="description">Check your understanding of strong passwords and multi-factor authentication in this set of free practice questions designed for AP Computer Science Principles students.</Attribute>
            <Attribute name="author">Pamela</Attribute>
            <Attribute name="type">exercise</Attribute>
            
            </DataObject>
        </PageMap>
        
    </url>
    
</urlset>
