Skip to the content Skip to the Navigation
CyberLadder.io
  • Home
  • Background
  • The Framework
    • Identify & Document
    • Plan
    • Implement
    • Educate & Test
  • Threats
  • Common Mistakes
  • Cautionary Tales
  • Glossary

Identify & Document

  1. HOME
  2. Identify & Document
  • What Is A Cybersecurity Program?
  • Hardware Asset Inventory
  • Software Asset Inventory
  • Stakeholders
  • Network Topology Maps
  • Guide to Basic Security Scans
  • Physical Site Map
  • Understanding Different Access Control Models
  • Digital Identities
  • Employee Privileges & Access Levels
  • Data Classification
  • Third-Party Access
  • Dependency Mapping
  • Risk Assessment & Management
  • Business Impact Analysis (BIA)
  • Gap Analysis
  • Technology Upgrades & Refresh Cycles
  • Applicable Regulations
  • Managed Security Service Providers (MSSPs)

An UMPI Capstone Project
More About UMPI

Homepage

Cybersecurity Program

YourPace Programs

Apply

Further Reading

NIST Cybersecurity Framework

MITRE ATT&CK

CISA Homepage

Center for Internet Security (CIS)

ISO/IEC 27001:2022

Copyright © CyberLadder.io All Rights Reserved.

Powered by WordPress & Lightning Theme by Vektor,Inc. technology.

MENU
  • Home
  • Background
  • The Framework
    • Identify & Document
    • Plan
    • Implement
    • Educate & Test
  • Threats
  • Common Mistakes
  • Cautionary Tales
  • Glossary