Skip to main content

Introduction: Understanding Multimodal Learning

 

What is up my friends!



If you follow me on the social platforms, you know I'm in the Neurodiverse space. My flavor affects how I learn and, somewhat, how I experience this world. I looked into learning styles in college where I first discovered that I am a multimodal learner. Simply, multimodal learners might be able to learn something through just one of the 4 (Visual, Aural, Read/write, Kinesthetic) but they might not and may need a mix several types to learn thoroughly. 


I've struggled and continue to struggle with picking up certain concepts and methodologies when it comes to learning offensive security. The purpose of this blog is twofold: learn this stuff & give my resources/process to others that learn like me. 


Each post will be separated into resources that reflect the 4 types of learning mentioned above.  I may make videos myself or record, I might link my notes from Notion. I will largely utilize platforms like TryHackMe or HacktheBox for kinesthetic, trying my best to find free content. 

Audio of the above:


AI generate image: a cyberpunk library, upscaled, vibrant colors


Example Blog Post:


Today we're learning about multimodal learning ;) Other words will likely go here, I hope if you are curious about this learning type that you get to spend some time reviewing the resources here. 


Visual:

Read about what it is here: What Is Multimodal Learning & How to Use It

Consider it a benefit: 7 Reasons to Love — and Leverage — Multimodal Learning in Your Classroom


Aural:

Ray Smith of EduPresence describes the origins of multi-modal learning and its uses in distributed adult professional education. It leverages learning technologies to bring learners together in rich social learning environments to learn from each other and the course leaders and be more effective than just learning in a traditional classroom:



Read/Write:

Rewatch the video above with captions on and take notes, did you get more from it than just listening? 

Take a few notes down after rereading one of the visual resources, did more stick?


Kinesthetic: 

This is a great little quiz to take to see if you are multimodal: https://arden.ac.uk/what-type-learner-are-you


So there it is! Hopefully, I'll see you around the inter webs soon. 



Disclaimer:  Understanding that this industry is already filled with educational content, the writer of this blog intends for this series to be utilized by professionals who are looking to find resources for said topics. The content within these resources should be learned and used with caution and common sense, taking note to understand the applicable laws of the reader's location. This is a personal blog of which any opinions or ideas expressed are of the owner/writer and not of any association they are affiliated with. To reach the writer of this blog, please find them on LinkedIn. When sharing this content with your own community it is requested that credit be given.

Popular posts from this blog

Enumeration: Introduction

  Enumeration: Introduction Hey everyone! It's incredible to hear back from so many of you already. 4 blog posts in, I can already feel the love.  I did go back this week and add a disclaimer to all posts. First, I wanted to ensure that folks are being careful with using the skills within the resources. Second, I just wanted to explain that this entire series is really about learning topics thoroughly, however you need to learn. As someone who is a multimodal learner, I'm actually using the resources in these posts to understand these topics as fully as I can. Let's get into enumeration. Taking directly from the company RedTeam Security , "Enumeration is the method that a penetration tester uses to identify information about in-scope assets. A pen tester will use an automated process to identify all active IP addresses within the scope and some limited information about those devices, such as type and operating system version. This information is then used for further...

Enumeration: NetBios

  Enumeration: NetBios If you come across this post but you're unsure about what NetBIOS actually is, take a moment to step back and go through this article (and the Professor Messor video inside) from Networkencyclopedia.com.  Okay cool, so we're on the same page now!  As we go through the resources for NetBIOS enumeration keep the following items in your mind - we're looking for them: system names usernames domains  printers available shares There are a ton of great tools out there to do NetBIOS enumeration. Just some of the few I found include:  nbtstat (Windows) winfo  (Windows) winfingerprint  (windows) nbtscan (Linux) smb-nat  (Linux) Hyena  (I have not used this yet but it came recommended) smbclient (Linux) - this page is overwhelming to my visual senses, ha, if there is a cleaner one, use it! nmap smbmap crackmapexec   Autorecon  (have not used this yet, it honestly looks awesome) msfconsole burp (web) many others,...