In the last post, I described how I used social media, in particular this blog and Twitter, to broadcast the notes for the study group I held for the CAPM/PMP exam prep class we put on when I was the Director of Certification at the Project Management Institute (PMI) Chicagoland Chapter.
What I want to do in this post is discuss the Feynman Technique, which is named after the famous physicist Richard Feynman:
- Choose a topic and study it–the best way is to combine reading about it, writing about it, and speaking about it.
- Teach the topic to beginners, which will force you to explain the concepts you have studied in simple language, and often resorting to other methods (pictures, analogies, stories) to get it across.
- Identify gaps in your knowledge uncovered in the previous step. This will often come from the questions you are asked by the beginners. What is that you aren’t you able to explain, either because you yourself don’t understand it, or because you don’t yet have the language to explain it simply to others?
- Review the original sources you studied from in step 1, and simplify what you are teaching.
I didn’t realize until years later that this was in effect the technique I had been using all along in my blog. The first step was taking the source material for project management, the Guide to the Project Management Body of Knowledge (PMBOK) and going through it chapter by chapter, section by section, trying to simplify the language as much as possible.
These are the notes that I wrote for the people who were in the study group, which was the second step listed above. If they missed a study session, I would just refer them to the notes. However, in the actual session (this was all done via conference call–these were in the days before Zoom calls), I would save the last 10 minutes or so for questions, and this is where step 3 came in.
I would get questions from the PMI members who were in the class, and sometimes I could answer the question, but sometimes I would get stumped. Sometimes it was because I myself was unclear on the subject, but in other cases, I just needed to work on the way I explained the concepts so that they understood what I had in my mind. When I came across a stumbling block, someone who didn’t understand that explanation, I had to think of analogies or pictures to make the concept clearer. This is the fourth step when you review and revise your earlier explanation. In any case, I would put that simplified explanation in the blog post and, from the feedback I was getting from readers, I could tell that in most cases, I had added value by making the PMBOK Guide material more understandable.
In one case, the PMBOK Guide had a complicated diagram explaining the different types of stakeholders on a project and I ended up using a simpler diagram using a set of concentric circles. This ended up being used in a later addition of the PMBOK Guide itself, so somebody who had seen my blog must have been on the editorial committee that put together the new version.
It’s success can be measured by the fact that I’ve had 2.5 million views from 1.5 million people, all from a total of 195 different countries, in the years since I launched the blog. Although I stopped writing content during the pandemic of 2020, I still get people looking up articles on my blog. My most circulated post was on the subject of scope creep, using the 1928 St. Francis Dam disaster as an example.
So since the Feynman technique was successful, in my estimation, let’s fast forward it to today. I completed my Associate’s Degree in Cybersecurity at University of Maryland Global Campus back in July of this year (2023), and I was talking to an HR professional I know about how to go about searching for a job in this new field.
He suggested that I, of course, update my resume and update my LinkedIn profile, with a job description from an entry-level position in cybersecurity as a focal point for shaping both of them. But when he saw on my resume that I had posted my 4squareviews professional blog as a reference, he discussed with me the idea of revitalizing my blog, but this time focusing on Information Technology, with an emphasis on Cybersecurity.
Our university recommended the following sequence of certifications:
1. CompTIA IT Fundamentals (optional)
2. CompTIA A+
3. CompTIA Network+
4. CompTIA Security+
5. Certified Ethical Hacker (CEH)
6. CompTIA Cybersecurity Analyst (CySA)
7. EC-Council Certified Secure Computer User
8. EC-Council Certified Incident Handler
to which a colleague at work added the following:
9. AWS Cloud Practitioner
You would probably consider 1 to be an entry level IT certification, and 9 to be an entry level AWS certification. You can consider A+ to be higher level of the same broad knowledge you gain with ITF, focusing on hardware and software.
Just call these level 1 certifications just to categorize them. Network+ and Security+ are the next level where you go into depth not about individual computers, but networks of computers and how to protect them against cyberattacks. I’ll call these level 2 certifications. Level 3 would be the certifications listed after that.
So, what I discussed with my HR “advisor” is that, in the next few months while I am pursuing the ITF, AWS Cloud Practitioner, and then the Security+ certifications (skipping A+ and Network+ for now), that I take the notes that I have been accumulating in preparation for these exams and post them on my 4squareviews blog, with the aim towards simplifying the concepts, or if they are a list of items to memorize, coming up with easier ways to commit them to memory.
In this case, the text I am using is the “All-In-One” series of textbooks, for the following reason.
They all come connected to an online classroom version on Udemy, although the textbook material is a LOT more thorough. So I’ll do the following for the IT Fundamentals exam.
1. Complete the Udemy course, including all of the chapter quizzes. (done)
2. Go through the All-In-One textbook, taking notes for each chapter and doing the chapter quizzes (done)
3. I’ll now take those notes (done with the Evernotes app) and rewrite them on my blog, simplifying and clarifying along the way. In this way, I am not in trouble with copywrite laws because I am not copying word for word (giving references to the text so people know where I got it from), but rather shaping it into my own words, adding elements such as timelines, charts, photos, etc., to make the material more accessible.
With the AWS material, I’m debating to use Cloud Academy or CloudWolf as my source for the study material.
When you get to the A+, Network+ and Security+, there is another great supplemental source, that of the materials done by Professor Messer.
It seems strange to use the blog to, in essence, pretend I am teaching a subject when I am actually in the process of learning it, but the Feynman technique will assure that I am understanding the subject at a deeper level than just rote memorization. After all, a future employer will want to know whether my paper certifications just show a surface knowledge of the subject or a deeper understanding of it.
It’s the latter I am aiming for, and that’s what I intend to do with IT and cybersecurity in particular. So here’s to the re-launching of this blog, but in a different direction! We all must start someway on our way to mastering a subject, and I choose THIS to be my starting place for IT!
Filed under: Uncategorized | Leave a comment »