GREM Exam Tips?
Greetings TechExams folks! First time poster here, and I've recently concluded the GIAC GREM course and am preparing for the GREM certification test. I know that I need to go through the books and bookmark any/all key terms, and that it's beneficial to go through the practical exercises for gaining a feel for what Mr. Zeltser is imparting. Any other useful tips and tricks that have helped you out? Any advice is welcomed and appreciated!
Tagged:
Comments
That sucks about the expiration, though much like, say the CISSP, I'm sure all they've done is add additional content, and not necessarily a complete overhaul of all knowledge. It took me a long, drawn-out time to get my CISSP, though by contrast, I did get my OSCP the first time I tested for it, albeit after purchasing an extension for course / lab access.
I figured that buying the practice tests and cert attempt would be wasted time if I don't feel at least adequately prepared to pass the exam, with the practice tests themselves serving as barometers for potential exam performance. Do you or anyone else know if GIAC has extended the test on-hand resource availability to include computers, or am I just talking crazy and all the sane people bring in bookmarked course books?
My daily work does not involve malware analysis either, though, I successfully pushed myself through a graduate class on specifically malware analysis (landing a high A), as well as having had the wonderful experience of being a Tier 2 SOC Analyst - Incident Responder, where I defeated malicious attachments and malware campaigns, hence my fascination and pursuit of this cert. Hopefully it'll lead to an expansion of career opportunities and perhaps the hunting of malware-related stuff
Insofar as to the disassembler used: only Ghidra was ever used in the course, Lenny never touched IDA the whole time, which is a paradigm shift, I know. He does touch on 64bit assembly, though doesn't go deep into it.
Thank you on the situational awareness into the test taking procedures and how on-hand sources can only be paper and not digital (computer). I still need to push through the books, as I relied on the SANS On-Access videos the whole time. As previously mentioned, I'm not a reverse engineer, though I've had a graduate course in it (where we dissected WannaCry) and got a crash-course in it, though the FOR610 course goes significantly deeper.
Way to go hard with those cert exams! I'm hoping you successfully passed all the tests you took?