Mastering CTEM: The 5 Essential Stages for Effective Cybersecurity