CISSP Memorization Tips and Techniques (ultimate guide)

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 มิ.ย. 2024
  • This video is a bonus lesson in the CISSP exam cram series, focused on a series of powerful memorization techniques to help you ace the exam, using actual material you need to memorize for the big day.
    ISC2 Official 2021 CISSP Study Guide and Practice Tests Bundle
    amzn.to/3yoWXpO
    CISSP 2021 Official Study Guide
    amzn.to/3nQEOgt
    CISSP 2021 Official Practice Tests
    amzn.to/3toaGdp
    FREE CISSP 50-questions practice quiz
    insidethemicrosoftcloud.com/c...
    pdf download of this presentation
    1drv.ms/b/s!AmhtzcmYt5AViK1RK...
    SIMON (AI-powered chatbot)
    lumagate.us/simon/
    Some of our video description contain affiliate links, which means we may receive a small commission on a purchase without additional cost to you, if you buy something.
    01:25 Mnemonics
    05:00 Picmonics
    07:20 Chunking
    13:30 Combining techniques
    17:03 Spaced repitition
    19:30 Memorization vs Understanding
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 66

  • @nsingh452
    @nsingh452 3 ปีที่แล้ว +15

    wow , I'm glad I came here. Thank you !!

  • @getdestroyed1958
    @getdestroyed1958 3 ปีที่แล้ว +37

    For The Software Capability Maturity Model you can also think of it in terms of working out!
    Initial - starting point
    Repeatable- stay with your workout routine
    If you do that you will get Defined. Once you are defined it’s just a matter of Managing your gains. If you can do that, you will stay Optimized 😊

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว

      I like it! Thanks for sharing! 👍

    • @maclinepius3961
      @maclinepius3961 ปีที่แล้ว

      Vcccccvvvvvvvvvvvv

    • @AsAxBoSs2012
      @AsAxBoSs2012 10 หลายเดือนก่อน

      This is good example understanding which leads to memorization.

  • @victorontheweb
    @victorontheweb 3 ปีที่แล้ว +6

    Bell LaPedula = Difficult to read and difficult to write down, therefore "No" read up and write down (if read is UP then write is DOWN), bIba and Clark-WIlson = The "I" in them stands for integrity / Goguen and Sutherland are men of "Integrity"

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว

      Hey Victor! Thanks for taking time to share your memory devices! Those are two I have not hear before. 👍

  • @glbglbglbglb
    @glbglbglbglb 3 ปีที่แล้ว +13

    Thanks for the great mnemonics. ACID and IDEAL are acronyms that don't need ones I think.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว +3

      Agree with you there, but thought I'd offer... just in case. 😉

  • @Brownbrostv
    @Brownbrostv 2 ปีที่แล้ว +4

    Thanks mate! It doesn't matter if I pass the exam or not,
    all the effort that you put in creating these videos - is appreciated! God bless you mate! keep the good content coming... :)

  • @glitchen
    @glitchen 2 ปีที่แล้ว +1

    Richard!
    That made me smile. Keep it up sir!

  • @dshaw2416
    @dshaw2416 3 ปีที่แล้ว +2

    Great content...Keep up the good work!

  • @silkeholtmanns6514
    @silkeholtmanns6514 2 ปีที่แล้ว +3

    For the control categories (preventive, detective, corrective, deterrent, recovery, compensating, directive) I use "Prevention Detects Common Data Recovery Chaos & Disasters". I know that the logic is not 100% clean as prevention does not detect, but many words fit already. So I can live with the twist...

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 ปีที่แล้ว +1

      Perfection is the enemy of progress. If it meets your need, the twist looks like an appropriate compromise to me. 👍

  • @mrrdw77
    @mrrdw77 3 ปีที่แล้ว +9

    No WURD = Biba =No Write Up, No Read Down

  • @vanamstel_nl
    @vanamstel_nl 3 ปีที่แล้ว +1

    Nice, thank’s a lot!

  • @jenniferarnold-abington299
    @jenniferarnold-abington299 ปีที่แล้ว +2

    I provisionally passed today! Thank you so much for the succinct info filled video. I used this video as last minute prep a week before taking the test!

    • @lilianacarranza4050
      @lilianacarranza4050 ปีที่แล้ว

      Hi, did you use any simulator?

    • @jenniferarnold-abington299
      @jenniferarnold-abington299 ปีที่แล้ว

      @Liliana Carranza I used the ISC2 materials (app, book, extra test book), all-in-one book, a boot camp, study group, and watched this channel and destination certification.

  • @sendhertothegrammys
    @sendhertothegrammys 2 ปีที่แล้ว +4

    More relevant for the OSI model, from layer 1 up: Please Do Not Toss Security Processes Aside
    ;-)

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 ปีที่แล้ว

      That definitely meets the relevance test I mentioned and I have never heard that one! Thanks for taking time to share!

  • @nicolaspontoizeau3080
    @nicolaspontoizeau3080 7 หลายเดือนก่อน +1

    Hi Pete thank you so much for your material. I am French and I would like to share the way I learn the 4 canons of the code of ethics. I use the 1st letter P protect... A act... P provide... A advance... => it gives the acronym PAPA that means "dady" in French it is pretty relevant to memorise when speacking responsible code of conduct 😉

  • @canuckle13
    @canuckle13 6 หลายเดือนก่อน +1

    Thanks for all your videos. These memorization tips were invaluable and helped me pass the exam this week 🥳

  • @webzest
    @webzest ปีที่แล้ว +3

    Love your techniques... Do you have a video on the OSI Model actual application? For example, the ports and or related dependencies that are required for the OSI Model to work. I took the practice Exam and one question was asked about at which layer does an encrypted authentication between a client software package and a firewall occurs?

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  ปีที่แล้ว

      Thanks! OSI model? I talk about it in a couple of spots. I show the protocols at each layer here -th-cam.com/video/_nyZhYnCNLA/w-d-xo.html. Exam shouldn't go deep on protocol and layer matching. Will be more about function and the right protocol for specific situations, which we cover throughout the full course video - th-cam.com/video/_nyZhYnCNLA/w-d-xo.html

  • @JSAGOO
    @JSAGOO 3 ปีที่แล้ว +1

    Thank you 🙏🏾

  • @kriskrossed4138
    @kriskrossed4138 3 ปีที่แล้ว +1

    Dingo species comment made me laugh... Great stuff looking forward to the other domain videos !

  • @alimotiwala570
    @alimotiwala570 3 ปีที่แล้ว +1

    Thank you.

  • @yehudagelbproductions
    @yehudagelbproductions 2 ปีที่แล้ว +2

    I find using memory palaces works wonders.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 ปีที่แล้ว

      It definitely has value and is a proven technique, although more difficult for most to perfect. I lean on spaced repetition with candidates because it is easier most, and addresses long-term retention, and as a result, more likely to lead to comprehension of the underlying material.

  • @GTMustangMan1
    @GTMustangMan1 3 ปีที่แล้ว +1

    Thank you

  • @jpcosta
    @jpcosta 2 ปีที่แล้ว

    3:54 the OSG 9th ed. describes TLS as part of the Transport layer

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 ปีที่แล้ว +2

      Per Wikipedia: Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly categorized as layer-4 protocols within OSI. Transport Layer Security (TLS) does not strictly fit inside the model either. It contains characteristics of the transport and presentation layers. en.m.wikipedia.org/wiki/OSI_model. Bottom line is TLS shares characteristics of layer 4 and layer 5. I don't think the distinction in this one off scenario is going to cause you any headaches on the exam. Good luck on exam day. 🍀🤞

  • @claudiabucknor7159
    @claudiabucknor7159 2 ปีที่แล้ว +1

    BINGO 👏👏👏👏

  • @GregWilson04
    @GregWilson04 3 ปีที่แล้ว +1

    Great content. Do you have this in Powerpoint format?

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว +1

      Looking for a study reference? If I provide in PDF format, will that work?

    • @GregWilson04
      @GregWilson04 3 ปีที่แล้ว

      @@InsideCloudAndSecurity Yes, sir. That would be great.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว +6

      Here it is in pdf format - 1drv.ms/b/s!AmhtzcmYt5AViK1RKrDYhCHdHvnCkw?e=i4zP7J

    • @GregWilson04
      @GregWilson04 3 ปีที่แล้ว +1

      @@InsideCloudAndSecurity Thank you. I really appreciate this.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว

      You're welcome😉

  • @b213videoz
    @b213videoz 3 ปีที่แล้ว

    Excellent stuff!
    But I found a bug: according to CISSP TLS is Transport not Presentation layer.
    6:38 isn't Containment meant to occur in Detection phase?
    "Response
    The response phase also called as containment phase. As the name suggests..."

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว +1

      Complicated it seems. Per Wikipedia, "Transport Layer Security (TLS) does not strictly fit inside the model either. It contains characteristics of the transport and presentation" en.wikipedia.org/wiki/OSI_model. Explains why it may appear in different layers in different charts on the Internet.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 ปีที่แล้ว

      this 2-minute segment more closely maps to the terminology of the official study th-cam.com/video/mLuLtIsDjK8/w-d-xo.html. You can also read about this topic in Chapter 17, which may help provide deeper detail. Appreciate you taking time to make comments.

  • @gshoez5173
    @gshoez5173 9 หลายเดือนก่อน +1

    Question about where the initial Triage happens. At the detection phase or Response ? I got study question wrong because i stated that the Triage happens at the Response phase per this video. The correct answer on the study question was at the Detections phase. Please advise

    • @gshoez5173
      @gshoez5173 9 หลายเดือนก่อน

      Based on the CBK, i believe the triage happens at the detection phase. Just a heads up

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  9 หลายเดือนก่อน +2

      No, it happens at the first phase post-detection. Here's the evidence from two authoritative sources. You don't see the word triage mentioned to many times so it's a good question, but my language in the incident response section of the full course (watch here - th-cam.com/video/_nyZhYnCNLA/w-d-xo.htmlsi=5gh4NcX2v5WoARug&t=22277) and my use of the word triage in the Response section is consistent with the Official Study Guide, where on page 892 says: "one of their first tasks is to assess the situation. This normally occurs in a rolling fashion, with the first responders performing a simple assessment to triage activity and get the disaster response under way." If you look at this resource (swimlane.com/blog/how-to-do-incident-response-triage-right/) it confirms triage happens in the first phase after detection, also consistent with my video link above.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  9 หลายเดือนก่อน +3

      Further supporting my evidence below, with Detection being the first phase, you cannot triage an issue until AFTER detection. You cannot assess what has not yet been detected, which is a distinct first phase. You cannot triage has not yet been detected.

  • @ashokc1988
    @ashokc1988 ปีที่แล้ว +1

    You should change channel's name as "Gem's factory" 😃

  • @bethsumner6706
    @bethsumner6706 ปีที่แล้ว +3

    OSI - Please Do Not Teach Stupid People Acronyms. 😂
    And then on the Bell and Biba when trying to remember which is the simple and which is Star property:
    You have to read before you can write. Reading is simpler than writing. Therefore read = simple and write = *.

  • @ferrisbeuler8657
    @ferrisbeuler8657 9 หลายเดือนก่อน

    Want to run a mnemonic past you for SYSLOG levels. Emergencies are critical except when nobody is distressed.
    Emergency
    Alert
    Critical
    Error
    Warning
    Notification
    Information
    Debug