As I discussed in Me and the CISSP, early on in my CISSP studies (impressed by The Feynman Technique) I came to the conclusion that the best way for me to understand and retain the information I was studying was to explain the topics to others. Ultimately I made around 70 topic videos that I posted on YouTube before I had to give it a pause so that I could spend more time on traditional study methods. Several of these videos appear to have been useful to others, whether they were studying for this certification or not, as they have generated a modest number of “views” in YouTube.
I will post the videos with the most views below, in hopes that they may help others . . .
- COBIT, COSO And ITIL – Summary And Differences
- M of N Control
- Brewer Nash Model (Aka Chinese Wall)
- Scytale Cipher Encryption
- Clark Wilson Model
- OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation)
- Baseband vs. Broadband
- ISO 27001 and 27002
- ROM: PROM, EPROM, EEPROM
- Biba Model