Judging from recent 
comments made by some of us here at TE, it appears that some of us will be either starting or resuming our OSCP studies in January, 2012. This thread is being created as a placeholder so that we can bounce ideas off each other, motivate one another, and share our experience as we go through this painful, yet fascinating course.
A few words of advice from someone who has already started the course:
1-) Familiarize yourself with Metasploit 
here.
2-) Familiarize yourself with bash scripting 
here.
3-) Familiarize yourself with python 
here.
4-) Familiarize yourself with the exploit development process by going over some of 
these tutorials, courtesy of the Corelan Team.
5-) DO all lab exercises, even the extra miles.
6-) Divorce vulnerability scanners. You will NOT be allowed to use them in the exam, so they will be of no use to you.
7-) The use of the Metasploit Framework (MSF) is limited in the exam, so ensure you are NOT dependent on it for exploitation of different targets.

 Reset lab machines prior to running a port scan on them. Run different port scans TCP / UDP, and do not rely on the standard ports used by tools such as NMAP.
9-) Lab machines exist for a reason, so do not be afraid to attack them in any way, shape or form.
10-) Think outside of the box and do additional research when necessary.
11-) Spend as much time as you can in the labs and try to pivot to other networks.
12-) When in doubt, 
Google is your best friend.
13-) Persistence is the key. Do not get discouraged if something does not work as expected. Also look for different avenues to attack certain targets.
14-) Document EVERYTHING. Documentation CAN provide you with the few extra points needed to pass the certification exam.
15-) Last, but not least…HAVE FUN!
Please be mindful of the NDA when positing comments in this thread. It’s OK to be helpful, but let’s be ethical and professional about it. Let the PAIN…error…FUN begin!!!