What is New with CompTIA Pentest+ PT0 002 Sheikh Raashid Javid NetCom Learning
1998-2021 NetComLearning Learning 1998-2022 NetCom ©©
www.netcomlearning.com | | (888) info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com
Course Objectives Scope organizational/customer requirements.
Target mobile devices.
Define the rules of engagement.
Attack specialized systems.
Footprint and gather intelligence.
Perform web application-based attacks.
Evaluate human and physical vulnerabilities. Prepare the vulnerability scan.
Perform system hacking. Script and software development. Leverage the attack: pivot and penetrate.
Scan logical vulnerabilities. Analyze scan results.
Communicate during the Pentesting process Summarize report components.
Avoid detection and cover tracks.
Recommend remediation. Exploit the LAN and cloud. Perform post-report delivery activities. Test wireless networks. ©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Table of Contents
Exam PT0-002
Lesson 1: Scoping Organizational/Customer Requirements
Lesson 11: Targeting Mobile Devices
Lesson 2: Defining the Rules of Engagement
Lesson 12: Attacking Specialized Systems
Lesson 3: Footprinting and Gathering Intelligence
Lesson 13: Web Application-Based Attacks
Lesson 4: Evaluating Human and Physical Vulnerabilities
Lesson 14: Performing System Hacking
Lesson 5: Preparing the Vulnerability Scan
Lesson 15: Scripting and Software Development
Lesson 6: Scanning Logical Vulnerabilities
Lesson 16: Leveraging the Attack: Pivot and Penetrate
Lesson 7: Analyzing Scanning Results
Lesson 17: Communicating During the Pentesting Process
Lesson 8: Avoiding Detection and Covering Tracks
Lesson 18: Summarizing Report Components
Lesson 9: Exploiting the LAN and Cloud
Lesson 19: Recommending Remediation
Lesson 10: Testing Wireless Networks
Lesson 20: Performing Post-Report Delivery Activities
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Exam Details Exam Code
PT0-002
Launch Date
October 28, 2021
Exam Description
The CompTIA PenTest+ will certify the successful candidate has the knowledge and skills required to plan and scope a penetration testing engagement including vulnerability scanning, understand legal and compliance requirements, analyze results, and produce a written report with remediation techniques.
Number of Questions Type of Questions Length of Test Passing Score
Maximum of 85 questions Performance-based and multiple choice 165 minutes 750 (on a scale of 100-900)
Recommended Experience
Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Labs 1.
Exploring the Lab Environment
2.
Exploring the Domain Tools: Nslookup, Dig and Whois 14. Using VSFTP Manual and Metasploit
3.
Navigating Open-Source Intelligence Tools
15. Monitoring with Aircrack-ng
4.
Understanding Social Engineering Toolkit (SET)
16. Discovering IoT devices with Shodan
5.
Understanding Spear Phishing and Credentials Attack
17. Using SQL Injection
6.
Exploring OpenVAS
18. Using Reverse and Bind Shells
7.
Using Web Scanners
19. Analyzing Exploit Code
8.
Understanding Nmap Common Usage
20. Exploring Programming Shells
9.
Scanning a Vulnerable System
21. Applying PenTest Automation
10. Understanding Scan Output 11. Navigating Steganography Tools
13. Exploring the Basics of Metasploit
22. Exploring Password Attacks with John the Ripper and Hydra
12. Demonstrating Enumeration Techniques
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 1 Scoping Organizational/Customer Requirements
Controls
Meeting Compliance Requirements PCI DSS, HIPAA, GDPR
• Administrative controls are security measures implemented to monitor the adherence to organizational policies and procedures • Physical controls restrict, detect and monitor access to specific physical areas or assets • Technical or logical controls automate protection to prevent unauthorized access or misuse, and include Access Control Lists (ACL),
Understanding PenTesting Frameworks ▪ ▪ ▪ ▪ ▪
IDS, IPS
▪
• All controls should use the Principle of Least
Open Web Application Security Project Evaluating Resources at NIST Open-source Security Testing Methodology Manual (OSSTMM). Information Systems Security Assessment Framework (ISSAF), Penetration Testing Execution Standard (PTES) Utilizing MITRE ATT&CK
Privilege Describe Ways to Maintain Professionalism
Reducing Overall Risk
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
Comparing steps taken during PenTesting
•
Background Checks of the Team
•
Identify and Report Criminal Activity
•
Maintaining Confidentiality
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 2 Defining the Rules of Engagement • Assess Environmental Considerations • Defining the Project Scope • Assessing the Network • Evaluating Web and/or Mobile Applications • Testing Cloud Resources • Identifying Restrictions • Recognizing Country, State, and Local Laws • Regulating the Use of Tools • Providing the Details • Adhering to a Timeline • Selecting a strategy- White, Grey or Black Box • Preparing Legal Documents • Sign a Nondisclosure agreement (NDA). • The Master Service Agreement (MSA) is a contract that establishes precedence and guidelines for any business documents that are executed between two parties • The Statement of Work (SOW) is a document that defines the expectations for a specific business arrangement • SLA ©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 3 Footprinting and Gathering Intelligence • Discover the Target • Gathering Information
• Compile Website Information • Enumerating the Target’s Website • Investigating the Website
• Identifying Organizational Contacts • Scraping Social Media • Scouring Job Listings
• OSINT Tools • Metagoofil • FOCA (Fingerprinting Organizations with Collected Archives)
• Examining DNS Information • Gather Essential Data
• theHarvester
• Using Public Source-Optimizing Search ResultsArchived Websites- Searching for Images
• Recon-ng
• Maltego • Shodan
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 4 Evaluating Human and Physical Vulnerabilities • Exploit the Human Psyche • • • •
Using Social Engineering Phishing-Pharming Spam-Vishing- SMiShing Impersonation
• Exploiting Physical Security • Circumventing Security •
Scaling Fences
•
Detecting Motion
•
Cloning a Badge
• Gaining Access •
Bypassing Locks
•
Tailgating and Piggybacking
•
Dumpster diving
•
Shoulder surfing
• The Social Engineering Toolkit (SET) ©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 5 Preparing the Vulnerability Plan • Plan the Vulnerability Scan
• Understanding Vulnerabilities • Exploiting the Unknown • Reducing Risks to Data • Performing Active Reconnaissance • Banner Grabbing • Mapping the Network • Detect Defenses
• Identifying Load Balancers, Firewalls, Antivirus
Lifecycle of a vulnerability
• Utilize Scanning Tools • Shodan, Censys • Nessus, OpenVAS, Nikto
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 6 Scanning Logical Vulnerabilities
• Scan Identified Targets • Different Types of Scans • Discovering Network Hosts • Scanning Ports- Full Scan, Stealth Scan
• Evaluate Network Traffic • Sniffing Using Wireshark • Scanning With Nessus
• Gathering ARP Traffic
• Assessing Vulnerable Web Applications • Crawling Web Applications
• Uncover Wireless Assets • War Driving Open Access Points
• Automating Vulnerability Scanning • Security Content Automation Protocol (SCAP)
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
• Mapping WAP Using WiGLE
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 7 Analyzing Scanning Results • Discover Nmap and NSE • Timing and Performance Considerations • Using TCP or UDP • Scripting with Nmap • Enumerate Network Hosts • Detecting Interesting Hosts • Fingerprinting the OS • Analyze Output from Scans • Examining Network Traffic • Reporting With Nmap • Interfacing With Zenmap • Exposing Vulnerable Web Servers
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
Topology of a network as shown in Zenmap
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 8 Avoiding Detection and Covering Tracks • Evade Detection • Flying Under the Radar • Spoofing • Using a Decoy • Covering your tracks
• Using Steganography • Steghide • OpenStego • Establish a covert channel • Remote Access • Using Secure Shell • Using Proxy
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
OpenStego
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 9 Exploiting the LAN and Cloud • Enumerating Hosts • Enumerating Websites • Nmap Scripts • Attack LAN Protocols • Macof attack • MITM Attack • Pass the hash • Exploit Tools • Metasploit • Armitage
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
• Discover Cloud Vulnerabilities • Configuring Cloud Assets • Understanding Storage Vulnerabilities • Controlling Identity and Access Management
• Explore Cloud-Based Attacks • Attacking the Cloud • Harvesting Credentials • DoS Attack • Auditing the Cloud • ScoutSuite • Testing with Pacu
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 10 Testing Wireless Networks • Discover Wireless Attacks • Securing Wireless Transmissions • Gathering the Signals • Cracking the Password or PIN
• MITM Attack, Evil Twin • Explore Wireless Tools • Aircrack-ng
• Kismet • Wifite2
Fern Wi-Fi cracker
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 11 Targeting Mobile Devices • Recognize Mobile Device Vulnerabilities • Deployment Models • Controlling Access • Enterprise mobility management (EMM) • Identifying Vulnerabilities- jailbreak • Launch Attacks on Mobile Devices • Spyware, Trojans, Rootkits, Virus, Worm • Social engineering • Hacking a Bluetooth Signal • Assessment Tools • Kali Linux
Using social engineering on a mobile phone
• Mobile Security Framework (MobSF)
• Mobile Security Testing Guide (MSTG).
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 12 Attacking Specialized Systems • Identify Attacks on the IoT • Discovering the IoT • Outlining Vulnerabilities • Triggering an Attack • Recognize Other Vulnerable Systems • Understanding Data Storage Systems • Securing Control Systems • Virtual Machine Vulnerabilities • Outlining Virtual Environments • Recognizing Vulnerabilities • VM Sprawl • Hyper jacking the Hypervisor
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
IoT ecosystem
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 13 Web Application Based Attacks • Recognize Web Vulnerabilities • OWASP Top 10 • Attacks • Session Hijacking • CSRF • Escalating Privilege • SQL Injection • Directory traversal • XSS • Overview of Tools • Browser Exploitation Framework • WPScan • SQLmap • SearchSploit
SearchSploit
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 14 Performing System Hacking • System Hacking • PowerShell Scripts • Use Remote Access Tools • SSH, Telnet, rlogin • Metasploit Framework
Metasploit msvenom script creation
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 15 Scripting and Software Development • Analyzing Scripts and Code Samples • Automating Tasks Using Scripting • Bash Shell • PowerShell cmdlets • Python, Ruby, Perl, JavaScript • Create Logic Constructs • Describing Variables • Applying Logic and Flow Control • Operators • Automate Penetration Testing • Scanning Port Using Automation • Acquiring Scripts and Tools
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 16 Leveraging the Attack: Pivot and Penetrate • Test Credentials • Comparing Password Attacks • Attacking Windows & Linux Passwords • Password Cracking Tools • Move Throughout the System • Metasploit • Lateral movement • Obtaining the Hash • Escalating Privilege
• Maintain Persistence • Using Backdoors and Trojans • Scheduling Tasks
Dumping Hashes
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 17 Communicating During the Pentesting Protest • Define the Communication Path • Outlining the Communication Path • Defining Contacts • Communication Triggers • Triggering Communication Events • Recognizing Criminal Activity • Identifying False Positives • Use Built-In Tools for Reporting • Sharing Findings with Dradis • Building Reports with Nessus
An example of Tenable's Nessus' platform.
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 18 Summarizing Report Components • Identify Report Audience • Reporting to Senior Management • Including Third-Party Stakeholders • Sharing Information with Technical Staff • Providing Details to Developers • List Report Contents • Defining the Executive Summary • Stepping Through the Methodology • Detailing the Attack Narrative • Determining Risk Appetite • Analyzing Business Impact • Suggesting Remediation
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
• Define Best Practices for Reports • Storing Reports • Securing Report Distribution • Ongoing Documentation During Tests • Grabbing Screenshots • Outlining Best Practices
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 19 Recommending Remediation • Employ Technical Controls • Hardening the Systems • Implementing Multifactor Authentication • Encrypting Passwords • Patch management • Certificate management • Administrative and Operational Controls • Implementing Policies and Procedures • Enforcing Minimum Password Requirements • Managing Organizational Mobile Devices
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
• Implementing People Security Controls • Outlining Other Operational Considerations • Job Rotation • Time of Day Restrictions • Mandatory Vacations • User Training • Physical Controls • Controlling Access to Buildings • Employing Biometric Controls • Utilizing Video Surveillance
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
Lesson 20 Performing Post-Report Delivery Activities • Post-Engagement Cleanup • Removing Shells • Deleting Test Credentials • Eliminating Tools • Destroying Test Data
• Follow-Up Actions • Gaining the Client’s Acceptance • Confirming the Findings • Planning the Retest • Reviewing Lessons Learned
©©1998-2021 NetCom Learning 1998-2022 NetCom Learning
www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
RECORDED WEBINAR VIDEO To watch the recorded webinar video for live demos, please access the link: https://bit.ly/3jTzhV7
© © 1998-2022 NetComLearning Learning 1998-2021 NetCom
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com | (888) || 1-888-563-8266
ABOUT NETCOM LEARNING
100K+
14K+
3500
Professionals trained
Corporate clients
IT, Business & Soft Skillscourses
96%
8.6/9
20+
Of customers recommend us to others
Instructor evaluations
Leadingvendors recognitions
Microsoft’s
80%
Top20
Worldwide training partner of the year
Trained of the Fortune 100
ITTraining Company
© © 1998-2019 1998-2022 NetCom Learning Learning 1998-2021NetCom NetCom Learning
NetCom Learning is an award-winning global leader in managed learning services, training and talent development. Founded
: 1998
Headquarters
: New YorkCity
Delivery Capability
: Worldwide
CEO
: RussellSarder
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266
RECOMMENDED COURSES AND MARKETING ASSETS NetCom Learning offers a comprehensive portfolio for Security » COMPTIA PENTEST+ CERTIFICATION PREP (EXAM PT0-002) - Class Scheduled on May 16 » CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-004) - Class Scheduled on May 23 » CompTIA A+ Certification Prep (Exam 220-1002) - Class Scheduled on May 16 » CompTIA Network+ Certification Prep (Exam N10-008) - Class Scheduled on May 09
You can also access the below Marketing Assets » Free 1hr Training - What Is New with CompTIA Network+ N10-008 » Free On-Demand Training - Learn the A to Z of IT Fundamentals with CompTIA A+ Certification » Blog - CompTIA Certifications: A+ vs. Linux+
© © 1998-2022 NetComLearning Learning 1998-2021 NetCom
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com | (888) || 1-888-563-8266
UPCOMING WEBINARS ▪ Microsoft 365 Master Class with FREE Access to Microsoft Official Curriculum (MS-900) ▪ AWS Discovery Day - An official introduction to the core concepts of cloud and AWS ▪ Microsoft Security, Compliance, and Identity Master Class with FREE Access to SC -900 MOC ▪ Visual Analytics: Best Practices, Sharing & Collaboration ▪ Designing the New Creative Experience for Businesses ▪ Microsoft 365: How to Build a Modern Digital Workplace ▪ AWS security: Getting started with cloud encryption ▪ What Is New with CompTIA Network+ N10-008 ▪ CCNP Enterprise Networks: Move One Step Closer to Advanced Networking ▪ How to Mitigate Malware and Ransomware Attacks Efficiently ▪ How to Migrate and Modernize with Microsoft Azure & More © © 1998-2022 NetCom Learning 1998-2019 Learning 1998-2021NetCom NetCom Learning
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266
PROMOTIONS
Free Cybersecurity Training! NetCom Learning brings an immersive two-hour, instructor-led Free Training on Cybersecurity that is designed to help businesses understand the importance of Cybersecurity in today’s digital world and gain expert insights into how security breaches can affect a business.. Learn More
© NetCom Learning 1998-2021 NetCom Learning © 1998-2019 1998-2022 NetCom Learning © 1998-2022 NetCom Learning
www.netcomlearning.com | www.netcomlearning.com 1-888-563-8266 || info@netcomlearning.com || 1-888-563-8266 www.netcomlearning.com info@netcomlearning.com Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
PROMOTIONS
Explore The World Of Unlimited Training Subscription! NetCom+ is a limitless 12-month subscription program. Attend over 500+ courses as from a range of authorized training courses. Get access to bundled offerings of Virtual Instructor-Led courses, e-Learning, Discovery Days, and On-Demand training via NetCom+ training subscription.. Save Now
© 1998-2019 NetCom Learning 1998-2021 1998-2022 NetCom Learning © 1998-2022 NetCom Learning
www.netcomlearning.com | Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com || 1-888-563-8266
PROMOTIONS
E- Learning To Skill Up ! Align and upskill your team via e-Learning to drive results! Our robust library includes Microsoft, Cisco, Citrix, CompTIA, Autodesk, and more. Our e-Learning solutions allow perfect balance among work and upskilling, without interrupting workflow. It’s all about saving time, quality learning, knowledge check, 24/7 availability. Learn More
© NetCom Learning 1998-2021 NetCom Learning © 1998-2019 1998-2022 NetCom Learning © 1998-2022 NetCom Learning
www.netcomlearning.com | www.netcomlearning.com 1-888-563-8266 || info@netcomlearning.com || 1-888-563-8266 www.netcomlearning.com info@netcomlearning.com Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com
PROMOTIONS
Access Your Passport To A Year Full Of Learning! The NetCom Learning Passport is a flexible pre-pay training package allowing you to plan and manage your teams’ annual training needs. With our Learning Passport, organizations get special pricing and extended program options to simplify management. Equipped with this Passport, you make the most of your budget. It has been specifically designed to specialize for the number of learners you plan to train.. Unlock Now
© 1998-2019 NetCom Learning 1998-2021 NetCom Learning © 1998-2022 NetCom Learning
www.netcomlearning.com | www.netcomlearning.com || info@netcomlearning.com Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com || 1-888-563-8266
PROMOTIONS
Worry-Free Training with Price Match Guarantee! Our Price Match Guarantee ensures that we'll match the offers of any other authorized training provider if you succeed at finding anyone offering the same publicly scheduled class within 30 days of our schedule at a lower regular price.. Learn More
© 1998-2019 1998-2022 NetCom Learning NetCom Learning 1998-2021 1998-2022 NetCom Learning
Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com www.netcomlearning.com | www.netcomlearning.com || info@netcomlearning.com || 1-888-563-8266
FOLLOW US ON
© © 1998-2019 1998-2022 NetCom Learning Learning 1998-2021NetCom NetCom Learning
YouTube
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266
BUILDING AN INNOVATIVE LEARNING ORG.
A BOOK FROM RUSSELL SARDER, CEO AT NETCOM LEARNING
A framework to build a smarter workforce, adapt to change and drive growth.
DOWNLOAD e-book
© © 1998-2019 1998-2022 NetCom Learning Learning 1998-2021NetCom NetCom Learning
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266
Thank you
© © 1998-2022 NetComLearning Learning 1998-2019 NetCom 1998-2021
Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com www.netcomlearning.com info@netcomlearning.com | (888) | || 1-888-563-8266