My approach to the multiple choice exam, was to treat it like any normal 500 level SANS exam.
My target – life-, work- and proctor-willing, is to take the exam on Saturday the 20th March 2010; which is exactly 42 days from now. As we all know 42 is the mean of Life or is that just a spooky coincidence?
I’m going to use an individual index system of each of the 3 courseware (401, 503 and 504). I have a brand new, lined A4 wire bound note book in which I’m handwriting the index of each book.
My goal is to have the 503 books indexed in seven days, then 504 indexed in seven days followed by the monstrous 401 fully indexed in ten days.
The rationale behind this is
1) To make me read each page of each book and work out if that page should be indexed
2) To make me read and think about each topic on the page
3) For me to make side notes on tools, topics or subjects that are unclear
4) I want to retain and use the knowledge for the practical exam
5) I like using pen and paper
To make sure I don’t become just book smart, I plan to also run through the practical questions and exercises throughout the courseware books.
I been pretty active with hands on training from studying and passing SANS Advanced Security Essentials – Enterprise Defender (SEC501) and Offensive Security’s Pentesting with Backtrack, but intend to use some of the following sites to keep sharp:
Pauldotcom’s links to challenges, tools and a variety of other madness http://www.pauldotcom.com/wiki/index.php/Main_Page and not to mention actually listening to the podcast
The web site of the three Spanish GSE http://www.radajo.com/ they set a huge benchmark to reach
The internet storm centre for what’s going down in the real world http://isc.sans.org/
The ethical hacker forums can post up some interesting links to other challenges http://www.ethicalhacker.net/
Ed Skoudis and friends various devious, mind-twisting and nefarious challenges http://www.counterhack.net/Counter_Hack/Challenges.html
Mr Skoudis and friends again with command line kung fu in all shapes and flavours http://blog.commandlinekungfu.com/
Laura Chappell is always fantastic for packets and wireshark http://laurachappell.blogspot.com/
Richard Bejtlich still pops up some great snort and packet stuff despite being a boss now http://taosecurity.blogspot.com
The SANS reading room for a brilliant reading resource and new ideas http://www.sans.org/reading_room/