Tips From Gil Owens on How To Pass the CISSP CAT Exam on the First Attempt

InfoSec Institute alum Gil Owens is a Cyber Systems Engineer at Peraton. Gil, a military-trained counterterrorism analyst, transitioned into a defense contractor role six years ago where he focuses on cyber defense and threat management. He’s earned his Network+, Security+, CEH, CCNA and CISSP certifications, and is preparing to take his CASP with InfoSec Institute this month.

With help from InfoSec Institute’s Certified Information Systems Security Professional (CISSP) Boot Camp, Gil passed his CISSP exam on his first attempt. In this Q&A, Gil shares his experience as an InfoSec student and offers tips to help others prepare for one of the toughest certification exams in the industry.

Why Did You Pursue CISSP Certification?

Before my security role, I was a military-trained counterterrorism analyst. The military managed my training and certification prep for this position. I went straight into Network+ and followed with Security+, CEH and CCNA. I took the CISSP training after my role changed from a military, operational position to an intelligence-based contractor role with Peraton.

What Do You Look for In Training Vendors?

I was looking for a partner who would meet my needs and was well-reviewed by other students. Before contacting InfoSec Institute about the CISSP course, I asked my friends and colleagues for training recommendations. Several recommended I look at InfoSec Institute.

My schedule isn’t always predictable, which can make scheduling training difficult. I needed a vendor who provided both in-person and online training options. I’ve had issues rescheduling courses with other vendors in the past, so finding a flexible vendor was important. That’s one of the things I appreciated about my InfoSec Institute rep, Brian. I changed my training date several times and he was really accommodating.

How Was Training With InfoSec Different From Your Other Experiences?

My experience with InfoSec Institute was positive (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: