In the CISSP video Security Architecture and Design part 2, TCSEC is incorrectly described. The video states that from strongest to weakest this is the order: A(1), B1, B2, B3, C1, C2, D. This is incorrect. The correct order from strongest to weakest is: A(1), B3, B2, B1, C2, C1, D.
See: http://en.wikipedia.org/wiki/Trusted_Computer_System_Evaluation_Criteria