Cracking the OSCE

Some of you followed my adventure towards OSCP. Now here is part two... becoming OSCE. 
This will probably be longer as my only experience with low level stuff is from OSCP and CTFs, so my first step is to get familiar with Assembly. To tackle this, I'm taking SLAE and SGDE (GNU Debugger) first, with plans to pay for OSCE in October and start November-ish.
I have a mixed goal here. First I want to be better at binary/low level exploitation, plus I want to challenge myself and tackle OSCE. I mean it looks good on the CV, doesn't it?

This will probably be longer as my only experience with low level stuff is from OSCP and CTFs, so my first step is to get familiar with Assembly. To tackle this, I'm taking SLAE and SGDE (GNU Debugger) first, with plans to pay for OSCE in October and start November-ish.
I have a mixed goal here. First I want to be better at binary/low level exploitation, plus I want to challenge myself and tackle OSCE. I mean it looks good on the CV, doesn't it?

Comments
Goals for 2019 : OSEE
Goals for 2020 : OSWE
Currently Working On: Python, OSCP Prep
Next Up: OSCP
Studying: Code Academy (Python), Bash Scripting, Virtual Hacking Lab Coursework
2023 Cert Goals: SC-100, eCPTX
Update: Finished the SecurityTube GDB Megaprimer, switching back to SLAE.
2023 Cert Goals: SC-100, eCPTX
Thanks for this and I will be following your post. Can I check how much is the course from Security Innovations?
Goals for 2019 : OSEE
Goals for 2020 : OSWE
I uploaded some of the stuff I wrote, including compiler instructions for x64 and small scriptlets. One problem that I faced on 64bit is that JMP-CALL-POP doesn't seem to work.
https://github.com/fuzboxz/SLAE
Goals for 2019 : OSEE
Goals for 2020 : OSWE