Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
78
4.5.1
Cornell Notes
There are many different note taking systems. Let’s briefly examine one called
Cornell Notes
,
164
which was developed by a Cornell University Professor named Walter Pauk in the 1950s. This
method involves using a pen and paper, which helps with dual encoding.
The first step is to divide the page into three areas. These are the
cue
(on the left hand side of the
page), the
notes
(the large area on the right hand side of the page), and the
summary
(several
lines of space at the bottom of the page).
Figure 3: An Illustration of Cornell Notes
The cue might be questions we have about the text or key words or phrases.
To illustrate an
example, let’s discuss a topic like password hashing. This topic might have key terms to learn
such as
one-way encryption
,
salting
, and
cracking passwords
. We might also have a question, for
example, “Are some hashing methods better than others?”
The notes section for that page should be directly related to the items in the cue section. For
example, near where we’ve written one-way encryption, we might write a long form definition of
what is meant by this term.
164
(Cornell University, 2022), https://lsc.cornell.edu/how-to-study/taking-notes/cornell-note-taking-system/
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
79
Finally, we will complete the summary section as we review our notes. To continue the example,
we might write “hashing a password = additional protection. Interested in more about cracking.”
The content here does not need to necessarily be directly related to
the material - this is an
opportunity to reflect on our own interest,
knowledge, and the study experience itself as well.
Later in this Module, we will explore how self-reflection can be helpful.
4.5.2
Retrieval Practice
Yüklə
Dostları ilə paylaş: