<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://www.cybertechnologie.com/</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/static/Index.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Formations.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Fiches-aide.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Plan-d-h-acces.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Plan-d-h-acces-inter.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Informations-legales.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Interventions.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Cyber.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-cafe.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-cafe-p2.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-cafe-p3.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-cafe-p4.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-espace-p1.htm</loc>
<lastmod>2010-02-06</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-espace-p2.htm</loc>
<lastmod>2010-02-06</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-espace-p3.htm</loc>
<lastmod>2010-02-06</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-espace-p4.htm</loc>
<lastmod>2010-02-06</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-espace-p5.htm</loc>
<lastmod>2010-02-15</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/logo-cyber-espace-p6.htm</loc>
<lastmod>2010-02-21</lastmod>
<changefreq>yearly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Liens-amis.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/Nous-contacter.htm</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/lbcube.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/universel/glossaire-internet.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/universel/raccourcis.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/universel/touches-clavier.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/excel/format-et-valeur.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/excel/calculs-simples.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/excel/graphiques-simples.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/excel/retour-a-la-ligne.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/word/numero-page-chapitre-entete.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/word/libelle-titre-dans-entete-w2007.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/word/libelle-titre-dans-entete.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/images-numeriques/copie-ecran.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/images-numeriques/paint.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/images-numeriques/jpeg-optimizer.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/internet/bloquer-pop-up.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/reseau/adresse-ip-box-operateur-configuration.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/reseau/commandes-reseaux-dos.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/reseau/configuration-reseau-simple.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>http://www.cybertechnologie.com/fiches-formation/reseau/definition-simple-reseau.html</loc>
<lastmod>2010-12-26</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
</urlset>