<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//riskguardtraining.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/definition-of-a-fraud/</loc>
		<lastmod>2026-03-29T15:44:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/the-criminal-thinking-fi-501/</loc>
		<lastmod>2026-03-31T09:50:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/the-investigator-roles-fi-503/</loc>
		<lastmod>2026-03-31T09:52:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/top-ten-workplace-frauds-fi-504/</loc>
		<lastmod>2026-03-31T09:53:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/types-of-evidence-fi-505/</loc>
		<lastmod>2026-03-31T09:53:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/the-investigation-cycle-fi-506/</loc>
		<lastmod>2026-03-31T09:53:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/investigation-technique-1-fi-507-the-prompting-question-techniques/</loc>
		<lastmod>2026-03-31T09:54:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/investigation-technique-2-fi-508/</loc>
		<lastmod>2026-03-31T09:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/investigation-technique-3-fi-509-the-profiling-techniques/</loc>
		<lastmod>2026-03-31T09:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/investigation-technique-4-fi-510/</loc>
		<lastmod>2026-03-31T09:54:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/documentation-fi-511/</loc>
		<lastmod>2026-03-31T09:55:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskguardtraining.com/courses/fraud-investigation-methodologies-fi-500/lessons/important-key-points-fi-512/</loc>
		<lastmod>2026-03-31T09:55:26+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->