<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 20, 2026 at 12:25 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://kdeacademy.org/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>KDE Academy</title>
		<link><![CDATA[https://kdeacademy.org]]></link>
		<description><![CDATA[KDE Academy]]></description>
		<lastBuildDate><![CDATA[Tue, 14 Apr 2026 11:19:15 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://kdeacademy.org/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/]]></link>
			<title>Module 1: Understanding AI in Government</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:19:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/]]></guid>
			<link><![CDATA[https://kdeacademy.org/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 29 Jun 2025 18:11:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/information-security-habits-and-procedures-that-protect-information-resources/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/information-security-habits-and-procedures-that-protect-information-resources/]]></link>
			<title>Information security habits and procedures that protect information resources</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/cybersecurity-awareness-training/lessons/module-2/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/cybersecurity-awareness-training/lessons/module-2/]]></link>
			<title>Module 2</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/lesson-content/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/lesson-content/]]></link>
			<title>Lesson content</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/registration/]]></guid>
			<link><![CDATA[https://kdeacademy.org/registration/]]></link>
			<title>Registration</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:53:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/cybersecurity-awareness-training/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/cybersecurity-awareness-training/]]></link>
			<title>Cybersecurity Awareness Training</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/cybersecurity-awareness-training/lessons/module-1/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/cybersecurity-awareness-training/lessons/module-1/]]></link>
			<title>Module 1</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-7/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-7/]]></link>
			<title>Chapter 7</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/registration-success/]]></guid>
			<link><![CDATA[https://kdeacademy.org/registration-success/]]></link>
			<title>Registration Success</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:53:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/cyber-incident-response-and-recovery/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/cyber-incident-response-and-recovery/]]></link>
			<title>Cyber Incident Response and Recovery</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-8/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-8/]]></link>
			<title>Chapter 8</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/careers-in-cybersecurity/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/careers-in-cybersecurity/]]></link>
			<title>Careers in cybersecurity</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-5/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-5/]]></link>
			<title>Chapter 5</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/profile/]]></guid>
			<link><![CDATA[https://kdeacademy.org/profile/]]></link>
			<title>Profile</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:53:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/mobile-security-your-pocket-sized-vault/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/mobile-security-your-pocket-sized-vault/]]></link>
			<title>Mobile Security: Your Pocket-Sized Vault</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-6/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-6/]]></link>
			<title>Chapter 6</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/data-privacy-protection/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/data-privacy-protection/]]></link>
			<title>Data privacy protection</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-3/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-3/]]></link>
			<title>Chapter 3</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/three-having-a-cyber-secure-mindset/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/three-having-a-cyber-secure-mindset/]]></link>
			<title>Three: Having A Cyber Secure Mindset</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/transparency-expectations/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/transparency-expectations/]]></link>
			<title>Transparency expectations</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:22:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-4/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-4/]]></link>
			<title>Chapter 4</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/accuracy-verification/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/accuracy-verification/]]></link>
			<title>Accuracy verification</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:22:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/privacy-and-security-safeguards/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/privacy-and-security-safeguards/]]></link>
			<title>Privacy and security safeguards</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:22:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/cybersecurity-in-daily-life/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/cybersecurity-in-daily-life/]]></link>
			<title>Cybersecurity in daily life</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-1/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-1/]]></link>
			<title>Chapter 1</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/government-accountability/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/government-accountability/]]></link>
			<title>Government accountability</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:22:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/intro-to-cybersecurity/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/intro-to-cybersecurity/]]></link>
			<title>Intro to Cybersecurity</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/reset-password/]]></guid>
			<link><![CDATA[https://kdeacademy.org/reset-password/]]></link>
			<title>Reset Password</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:53:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/chapter-2/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/chapter-2/]]></link>
			<title>Chapter 2</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/topics/anatomy-of-cyberattacks/]]></guid>
			<link><![CDATA[https://kdeacademy.org/topics/anatomy-of-cyberattacks/]]></link>
			<title>Anatomy of cyberattacks</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/human-oversight-requirements/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/topics/human-oversight-requirements/]]></link>
			<title>Human oversight requirements</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:21:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/lesson/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/lesson/]]></link>
			<title>Lesson</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:21:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/product/cyber-scams-dont-be-a-victim/]]></guid>
			<link><![CDATA[https://kdeacademy.org/product/cyber-scams-dont-be-a-victim/]]></link>
			<title>Cyber Scams Don’t Be A Victim</title>
			<pubDate><![CDATA[Sat, 14 Feb 2026 15:01:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/intro-to-cybersecurity-guide-for-beginners/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/intro-to-cybersecurity-guide-for-beginners/]]></link>
			<title>Intro to Cybersecurity Guide for Beginners</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-3-responsible-ethical-ai-best-practices/]]></link>
			<title>Module 3: Responsible &amp; Ethical AI Best Practices</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:21:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/risk-mitigation-approaches/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/risk-mitigation-approaches/]]></link>
			<title>Risk mitigation approaches</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:21:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/legal-restrictions-and-prohibited-ai-uses/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/legal-restrictions-and-prohibited-ai-uses/]]></link>
			<title>Legal restrictions and prohibited AI uses</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:21:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/data-quality-and-bias-considerations/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/data-quality-and-bias-considerations/]]></link>
			<title>Data quality and bias considerations</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:21:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/accuracy-limitations-and-outdated-outputs/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/topics/accuracy-limitations-and-outdated-outputs/]]></link>
			<title>Accuracy limitations and outdated outputs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:20:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/lessons/accuracy-limitations-and-outdated-outputs/]]></guid>
			<link><![CDATA[https://kdeacademy.org/lessons/accuracy-limitations-and-outdated-outputs/]]></link>
			<title>Accuracy limitations and outdated outputs</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-2-risks-and-limitations-of-ai/]]></link>
			<title>Module 2: Risks and Limitations of AI</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/safe-and-compliant-ai-usage-expectations/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/safe-and-compliant-ai-usage-expectations/]]></link>
			<title>Safe and compliant AI usage expectations</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:20:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/appropriate-and-authorized-ai-tools/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/appropriate-and-authorized-ai-tools/]]></link>
			<title>Appropriate and authorized AI tools</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:19:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/common-public-sector-use-cases/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/common-public-sector-use-cases/]]></link>
			<title>Common public sector use cases</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:19:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/what-ai-is-and-how-it-works-at-a-high-level/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/lessons/module-1-understanding-ai-in-government/topics/what-ai-is-and-how-it-works-at-a-high-level/]]></link>
			<title>What AI is and how it works at a high level</title>
			<pubDate><![CDATA[Tue, 14 Apr 2026 11:19:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/cyber-scams-dont-be-a-victim/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/cyber-scams-dont-be-a-victim/]]></link>
			<title>Cyber Scams Don’t Be A Victim</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/intro-to-computer-networking/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/intro-to-computer-networking/]]></link>
			<title>Intro to Computer Networking</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:58:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/product/cybersecurity-awareness-training/]]></guid>
			<link><![CDATA[https://kdeacademy.org/product/cybersecurity-awareness-training/]]></link>
			<title>Cybersecurity Awareness Training</title>
			<pubDate><![CDATA[Sat, 14 Feb 2026 14:59:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/]]></guid>
			<link><![CDATA[https://kdeacademy.org/courses/responsible-ai-awareness-for-public-sector-employees-training-course/]]></link>
			<title>Responsible AI Awareness for Public Sector Employees Training Course</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:29:43 +0000]]></pubDate>
		</item>
				</channel>
</rss>
