CISSP Memorization Tips and Techniques (ultimate guide)

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024

Комментарии • 68

  • @nsingh452
    @nsingh452 3 года назад +15

    wow , I'm glad I came here. Thank you !!

  • @getdestroyed1958
    @getdestroyed1958 3 года назад +41

    For The Software Capability Maturity Model you can also think of it in terms of working out!
    Initial - starting point
    Repeatable- stay with your workout routine
    If you do that you will get Defined. Once you are defined it’s just a matter of Managing your gains. If you can do that, you will stay Optimized 😊

  • @Brownbrostv
    @Brownbrostv 3 года назад +5

    Thanks mate! It doesn't matter if I pass the exam or not,
    all the effort that you put in creating these videos - is appreciated! God bless you mate! keep the good content coming... :)

  • @victorontheweb
    @victorontheweb 3 года назад +6

    Bell LaPedula = Difficult to read and difficult to write down, therefore "No" read up and write down (if read is UP then write is DOWN), bIba and Clark-WIlson = The "I" in them stands for integrity / Goguen and Sutherland are men of "Integrity"

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 года назад

      Hey Victor! Thanks for taking time to share your memory devices! Those are two I have not hear before. 👍

  • @glbglbglbglb
    @glbglbglbglb 3 года назад +14

    Thanks for the great mnemonics. ACID and IDEAL are acronyms that don't need ones I think.

  • @mrrdw77
    @mrrdw77 3 года назад +12

    No WURD = Biba =No Write Up, No Read Down

  • @silkeholtmanns6514
    @silkeholtmanns6514 2 года назад +3

    For the control categories (preventive, detective, corrective, deterrent, recovery, compensating, directive) I use "Prevention Detects Common Data Recovery Chaos & Disasters". I know that the logic is not 100% clean as prevention does not detect, but many words fit already. So I can live with the twist...

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 года назад +1

      Perfection is the enemy of progress. If it meets your need, the twist looks like an appropriate compromise to me. 👍

  • @nicolaspontoizeau3080
    @nicolaspontoizeau3080 10 месяцев назад +2

    Hi Pete thank you so much for your material. I am French and I would like to share the way I learn the 4 canons of the code of ethics. I use the 1st letter P protect... A act... P provide... A advance... => it gives the acronym PAPA that means "dady" in French it is pretty relevant to memorise when speacking responsible code of conduct 😉

  • @jenniferarnold-abington299
    @jenniferarnold-abington299 2 года назад +2

    I provisionally passed today! Thank you so much for the succinct info filled video. I used this video as last minute prep a week before taking the test!

    • @lilianacarranza4050
      @lilianacarranza4050 Год назад

      Hi, did you use any simulator?

    • @jenniferarnold-abington299
      @jenniferarnold-abington299 Год назад

      @Liliana Carranza I used the ISC2 materials (app, book, extra test book), all-in-one book, a boot camp, study group, and watched this channel and destination certification.

  • @sendhertothegrammys
    @sendhertothegrammys 2 года назад +4

    More relevant for the OSI model, from layer 1 up: Please Do Not Toss Security Processes Aside
    ;-)

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 года назад

      That definitely meets the relevance test I mentioned and I have never heard that one! Thanks for taking time to share!

  • @canuckle13
    @canuckle13 9 месяцев назад +1

    Thanks for all your videos. These memorization tips were invaluable and helped me pass the exam this week 🥳

  • @webzest
    @webzest Год назад +3

    Love your techniques... Do you have a video on the OSI Model actual application? For example, the ports and or related dependencies that are required for the OSI Model to work. I took the practice Exam and one question was asked about at which layer does an encrypted authentication between a client software package and a firewall occurs?

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  Год назад

      Thanks! OSI model? I talk about it in a couple of spots. I show the protocols at each layer here -ruclips.net/video/_nyZhYnCNLA/видео.html. Exam shouldn't go deep on protocol and layer matching. Will be more about function and the right protocol for specific situations, which we cover throughout the full course video - ruclips.net/video/_nyZhYnCNLA/видео.html

  • @MaryMcCabe-m6z
    @MaryMcCabe-m6z Месяц назад

    Brilliant types. The techniques for learning are genius. Thank heavens I found this. Thank you :}

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  Месяц назад

      You're so welcome! Good luck on the exam. Make sure you check out my CISSP playlist! ruclips.net/p/PL7XJSuT7Dq_XPK_qmYMqfiBjbtHJRWigD&si=KRsxWk5yT5pcpUcj

  • @glitchen
    @glitchen 3 года назад +1

    Richard!
    That made me smile. Keep it up sir!

  • @dshaw2416
    @dshaw2416 3 года назад +2

    Great content...Keep up the good work!

  • @kriskrossed4138
    @kriskrossed4138 3 года назад +1

    Dingo species comment made me laugh... Great stuff looking forward to the other domain videos !

  • @yehudagelbproductions
    @yehudagelbproductions 2 года назад +2

    I find using memory palaces works wonders.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 года назад

      It definitely has value and is a proven technique, although more difficult for most to perfect. I lean on spaced repetition with candidates because it is easier most, and addresses long-term retention, and as a result, more likely to lead to comprehension of the underlying material.

  • @vanamstel_nl
    @vanamstel_nl 3 года назад +1

    Nice, thank’s a lot!

  • @gshoez5173
    @gshoez5173 Год назад +1

    Question about where the initial Triage happens. At the detection phase or Response ? I got study question wrong because i stated that the Triage happens at the Response phase per this video. The correct answer on the study question was at the Detections phase. Please advise

    • @gshoez5173
      @gshoez5173 Год назад

      Based on the CBK, i believe the triage happens at the detection phase. Just a heads up

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  Год назад +2

      No, it happens at the first phase post-detection. Here's the evidence from two authoritative sources. You don't see the word triage mentioned to many times so it's a good question, but my language in the incident response section of the full course (watch here - ruclips.net/video/_nyZhYnCNLA/видео.htmlsi=5gh4NcX2v5WoARug&t=22277) and my use of the word triage in the Response section is consistent with the Official Study Guide, where on page 892 says: "one of their first tasks is to assess the situation. This normally occurs in a rolling fashion, with the first responders performing a simple assessment to triage activity and get the disaster response under way." If you look at this resource (swimlane.com/blog/how-to-do-incident-response-triage-right/) it confirms triage happens in the first phase after detection, also consistent with my video link above.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  Год назад +3

      Further supporting my evidence below, with Detection being the first phase, you cannot triage an issue until AFTER detection. You cannot assess what has not yet been detected, which is a distinct first phase. You cannot triage has not yet been detected.

  • @jpcosta
    @jpcosta 2 года назад

    3:54 the OSG 9th ed. describes TLS as part of the Transport layer

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  2 года назад +2

      Per Wikipedia: Although not developed under the OSI Reference Model and not strictly conforming to the OSI definition of the transport layer, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) of the Internet Protocol Suite are commonly categorized as layer-4 protocols within OSI. Transport Layer Security (TLS) does not strictly fit inside the model either. It contains characteristics of the transport and presentation layers. en.m.wikipedia.org/wiki/OSI_model. Bottom line is TLS shares characteristics of layer 4 and layer 5. I don't think the distinction in this one off scenario is going to cause you any headaches on the exam. Good luck on exam day. 🍀🤞

  • @b213videoz
    @b213videoz 3 года назад

    Excellent stuff!
    But I found a bug: according to CISSP TLS is Transport not Presentation layer.
    6:38 isn't Containment meant to occur in Detection phase?
    "Response
    The response phase also called as containment phase. As the name suggests..."

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 года назад +1

      Complicated it seems. Per Wikipedia, "Transport Layer Security (TLS) does not strictly fit inside the model either. It contains characteristics of the transport and presentation" en.wikipedia.org/wiki/OSI_model. Explains why it may appear in different layers in different charts on the Internet.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 года назад

      this 2-minute segment more closely maps to the terminology of the official study ruclips.net/video/mLuLtIsDjK8/видео.html. You can also read about this topic in Chapter 17, which may help provide deeper detail. Appreciate you taking time to make comments.

  • @JSAGOO
    @JSAGOO 3 года назад +1

    Thank you 🙏🏾

  • @alimotiwala570
    @alimotiwala570 3 года назад +1

    Thank you.

  • @ashokc1988
    @ashokc1988 2 года назад +1

    You should change channel's name as "Gem's factory" 😃

  • @GregWilson04
    @GregWilson04 3 года назад +1

    Great content. Do you have this in Powerpoint format?

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 года назад +1

      Looking for a study reference? If I provide in PDF format, will that work?

    • @GregWilson04
      @GregWilson04 3 года назад

      @@InsideCloudAndSecurity Yes, sir. That would be great.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 года назад +6

      Here it is in pdf format - 1drv.ms/b/s!AmhtzcmYt5AViK1RKrDYhCHdHvnCkw?e=i4zP7J

    • @GregWilson04
      @GregWilson04 3 года назад +1

      @@InsideCloudAndSecurity Thank you. I really appreciate this.

    • @InsideCloudAndSecurity
      @InsideCloudAndSecurity  3 года назад

      You're welcome😉

  • @claudiabucknor7159
    @claudiabucknor7159 3 года назад +1

    BINGO 👏👏👏👏

  • @bethsumner6706
    @bethsumner6706 Год назад +3

    OSI - Please Do Not Teach Stupid People Acronyms. 😂
    And then on the Bell and Biba when trying to remember which is the simple and which is Star property:
    You have to read before you can write. Reading is simpler than writing. Therefore read = simple and write = *.

  • @ferrisbeuler8657
    @ferrisbeuler8657 Год назад

    Want to run a mnemonic past you for SYSLOG levels. Emergencies are critical except when nobody is distressed.
    Emergency
    Alert
    Critical
    Error
    Warning
    Notification
    Information
    Debug

  • @GTMustangMan1
    @GTMustangMan1 3 года назад +1

    Thank you