<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<channel rdf:about="http://hdl.handle.net/123456789/25745">
<title>2022</title>
<link>http://hdl.handle.net/123456789/25745</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/25834"/>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/25833"/>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/25832"/>
<rdf:li rdf:resource="http://hdl.handle.net/123456789/25831"/>
</rdf:Seq>
</items>
<dc:date>2026-04-10T10:25:12Z</dc:date>
</channel>
<item rdf:about="http://hdl.handle.net/123456789/25834">
<title>Network routing And Switching</title>
<link>http://hdl.handle.net/123456789/25834</link>
<description>Network routing And Switching
MIIT
</description>
<dc:date>2022-06-21T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/123456789/25833">
<title>Wireless Network</title>
<link>http://hdl.handle.net/123456789/25833</link>
<description>Wireless Network
MIIT
</description>
<dc:date>2022-06-21T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/123456789/25832">
<title>IT Security Audit and Assesment</title>
<link>http://hdl.handle.net/123456789/25832</link>
<description>IT Security Audit and Assesment
MIIT
</description>
<dc:date>2022-06-21T00:00:00Z</dc:date>
</item>
<item rdf:about="http://hdl.handle.net/123456789/25831">
<title>Principles of artificial Intelligence</title>
<link>http://hdl.handle.net/123456789/25831</link>
<description>Principles of artificial Intelligence
MIIT
</description>
<dc:date>2022-06-20T00:00:00Z</dc:date>
</item>
</rdf:RDF>
