I took SANS 560 back in March at the Orlando conference which I wrote about here:
http://www.techexams.net/forums/sans-institute-giac-certifications/87391-sec-560-sans-2013-orlando.html
After pushing back my exam date several times, I finally willed myself into sitting the exam before the four-month clock ran out. By this point I pretty much didn't care whether I passed or failed. I just wanted to get back to work and get stuff done.
I managed to complete my thirteen-page index in the last week and sat for my three-hour exam today. It took me a little over two hours, but I survived with a score of 93%, which was better than the 87% on my practice exam that I sort of rushed through a few days earlier. Not a score with a lot of bragging rights, but it's above that psychological barrier of 90% which I missed with my GAWN exam earlier in the year. A hundred and fifteen questions seem to stretch out after a while, and I skipped four questions since they required more mental effort. At the end of the exam, I finally had to answer those and they turned out to be a bit easier than I thought.
The test questions were decent, although I had a couple of near-repeats. There were a also couple of questions which I felt were subject to different interpretations and thus answers.
This felt like a typical GIAC open-book exam experience. It was a bit harder than some of the other GIAC exams I've taken. I wouldn't say that SANS 560 is the pinnacle of pentesting courses, although I found it well-structured and a joy with Ed Skoudis teaching. If you've worked with Windows, Linux, and networking, you'll have a good base to go through the course and exam. If you're missing one of these areas, life will be much harder. You definitely need basic Linux skills, and I saw at least one Windows/Cisco guy struggle a bit during the CTF in Orlando. Luckily my career background as a generalist has covered a lot of these areas which 560 dives into. GPEN is mostly about network and host pentesting, although there's some web application and wireless topics thrown in to round it out.
SANS-wise, the next step would be 660 - Advanced Penetration Testing, Exploits, and Ethical Hacking. My co-worker just signed up for it so it'll be interesting to hear his experience. I'd prefer to do OSCP before I attempt 660, but OSCP requires an enormous months-long commitment, something that I simply am not able afford at the moment. I love the Offensive Security approach to training though.
So there it is - another somewhat meaningless four-letter label next to my name with another plaque to throw into the file cabinet. Not to put down the GIAC program or certifications in general, but it's not like I'm ready to do some serious real-world pentests now on my own just because "I'm GPEN-certified." SANS 560 and the GPEN exam was a good packaged experience in getting my feet wet and hopefully better informed as a enterprise defender. I'll no doubt sign up for more SANS training in the future, although I'm starting to question whether I'll pursue the associated GIAC certification or instead use the funds to buy equipment for more hands-on practice opportunities. Training is fun, but infosec professionals tend to not give a damn about the alphabet soup itself.
On a side note, I decided to check the giac.org website five or ten minutes after finishing my exam. My name and GPEN achievement was already listed. It almost feels like the process is all automated now.