Challenging the GCIH

in GIAC
Hello all,
I am going to be challenging the GCIH hopefully on Monday. I don't have the spare $ laying around for the 504 course.
I picked up two books: Counter Hack: Reloaded Version 2 and Hacker Techniques, Tools, and Incident Handling.
I also heard that I will be given two practice exams for challenging the exam.
Since I already hold the Security+ certification, conduct vulnerability assessment using security scanners, and have McAfee's ePolicy Orchestrator experience, this should be fairly easy..
I am going to be challenging the GCIH hopefully on Monday. I don't have the spare $ laying around for the 504 course.
I picked up two books: Counter Hack: Reloaded Version 2 and Hacker Techniques, Tools, and Incident Handling.
I also heard that I will be given two practice exams for challenging the exam.
Since I already hold the Security+ certification, conduct vulnerability assessment using security scanners, and have McAfee's ePolicy Orchestrator experience, this should be fairly easy..
Comments
Good luck and let us know how your GCIH self-study is progressing.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
I've overlooked the actual class bulletin and looks like I have all the material that relates to it except for the main incident handling process which now worries me. Now my book (Certification Exam Preperation Course in a Book) outlines everything to study and gives me the main points, but not the cream of the crop.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
A co-worker of mine did mention quite a bit of the actual incident handling processes resembled the NIST resources
[h=3]NIST SP 800-61, Computer Security Incident Handling Guide[/h]That link is the updated version from August 2012.
JD's on target, there have been a couple of really good reviews of the GCIH here.
It covers all of the exam objectives in great detail except for Format String Attacks and Virtual Machine Attacks. It lacks Incident Handling...
Thank you
Ken
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray