What is new with CompTIA PenTest+- PT0 002

Page 1

What is New with CompTIA Pentest+ PT0 002 Sheikh Raashid Javid NetCom Learning

1998-2021 NetComLearning Learning 1998-2022 NetCom ©©

www.netcomlearning.com | | (888) info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com


Course Objectives Scope organizational/customer requirements.

Target mobile devices.

Define the rules of engagement.

Attack specialized systems.

Footprint and gather intelligence.

Perform web application-based attacks.

Evaluate human and physical vulnerabilities. Prepare the vulnerability scan.

Perform system hacking. Script and software development. Leverage the attack: pivot and penetrate.

Scan logical vulnerabilities. Analyze scan results.

Communicate during the Pentesting process Summarize report components.

Avoid detection and cover tracks.

Recommend remediation. Exploit the LAN and cloud. Perform post-report delivery activities. Test wireless networks. ©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Table of Contents

Exam PT0-002

Lesson 1: Scoping Organizational/Customer Requirements

Lesson 11: Targeting Mobile Devices

Lesson 2: Defining the Rules of Engagement

Lesson 12: Attacking Specialized Systems

Lesson 3: Footprinting and Gathering Intelligence

Lesson 13: Web Application-Based Attacks

Lesson 4: Evaluating Human and Physical Vulnerabilities

Lesson 14: Performing System Hacking

Lesson 5: Preparing the Vulnerability Scan

Lesson 15: Scripting and Software Development

Lesson 6: Scanning Logical Vulnerabilities

Lesson 16: Leveraging the Attack: Pivot and Penetrate

Lesson 7: Analyzing Scanning Results

Lesson 17: Communicating During the Pentesting Process

Lesson 8: Avoiding Detection and Covering Tracks

Lesson 18: Summarizing Report Components

Lesson 9: Exploiting the LAN and Cloud

Lesson 19: Recommending Remediation

Lesson 10: Testing Wireless Networks

Lesson 20: Performing Post-Report Delivery Activities

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Exam Details Exam Code

PT0-002

Launch Date

October 28, 2021

Exam Description

The CompTIA PenTest+ will certify the successful candidate has the knowledge and skills required to plan and scope a penetration testing engagement including vulnerability scanning, understand legal and compliance requirements, analyze results, and produce a written report with remediation techniques.

Number of Questions Type of Questions Length of Test Passing Score

Maximum of 85 questions Performance-based and multiple choice 165 minutes 750 (on a scale of 100-900)

Recommended Experience

Network+, Security+ or equivalent knowledge. Minimum of 3-4 years of hands-on information security or related experience. While there is no required prerequisite, PenTest+ is intended to follow CompTIA Security+ or equivalent experience and has a technical, hands-on focus.

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Labs 1.

Exploring the Lab Environment

2.

Exploring the Domain Tools: Nslookup, Dig and Whois 14. Using VSFTP Manual and Metasploit

3.

Navigating Open-Source Intelligence Tools

15. Monitoring with Aircrack-ng

4.

Understanding Social Engineering Toolkit (SET)

16. Discovering IoT devices with Shodan

5.

Understanding Spear Phishing and Credentials Attack

17. Using SQL Injection

6.

Exploring OpenVAS

18. Using Reverse and Bind Shells

7.

Using Web Scanners

19. Analyzing Exploit Code

8.

Understanding Nmap Common Usage

20. Exploring Programming Shells

9.

Scanning a Vulnerable System

21. Applying PenTest Automation

10. Understanding Scan Output 11. Navigating Steganography Tools

13. Exploring the Basics of Metasploit

22. Exploring Password Attacks with John the Ripper and Hydra

12. Demonstrating Enumeration Techniques

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 1 Scoping Organizational/Customer Requirements

Controls

Meeting Compliance Requirements PCI DSS, HIPAA, GDPR

• Administrative controls are security measures implemented to monitor the adherence to organizational policies and procedures • Physical controls restrict, detect and monitor access to specific physical areas or assets • Technical or logical controls automate protection to prevent unauthorized access or misuse, and include Access Control Lists (ACL),

Understanding PenTesting Frameworks ▪ ▪ ▪ ▪ ▪

IDS, IPS

• All controls should use the Principle of Least

Open Web Application Security Project Evaluating Resources at NIST Open-source Security Testing Methodology Manual (OSSTMM). Information Systems Security Assessment Framework (ISSAF), Penetration Testing Execution Standard (PTES) Utilizing MITRE ATT&CK

Privilege Describe Ways to Maintain Professionalism

Reducing Overall Risk

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

Comparing steps taken during PenTesting

Background Checks of the Team

Identify and Report Criminal Activity

Maintaining Confidentiality

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 2 Defining the Rules of Engagement • Assess Environmental Considerations • Defining the Project Scope • Assessing the Network • Evaluating Web and/or Mobile Applications • Testing Cloud Resources • Identifying Restrictions • Recognizing Country, State, and Local Laws • Regulating the Use of Tools • Providing the Details • Adhering to a Timeline • Selecting a strategy- White, Grey or Black Box • Preparing Legal Documents • Sign a Nondisclosure agreement (NDA). • The Master Service Agreement (MSA) is a contract that establishes precedence and guidelines for any business documents that are executed between two parties • The Statement of Work (SOW) is a document that defines the expectations for a specific business arrangement • SLA ©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 3 Footprinting and Gathering Intelligence • Discover the Target • Gathering Information

• Compile Website Information • Enumerating the Target’s Website • Investigating the Website

• Identifying Organizational Contacts • Scraping Social Media • Scouring Job Listings

• OSINT Tools • Metagoofil • FOCA (Fingerprinting Organizations with Collected Archives)

• Examining DNS Information • Gather Essential Data

• theHarvester

• Using Public Source-Optimizing Search ResultsArchived Websites- Searching for Images

• Recon-ng

• Maltego • Shodan

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 4 Evaluating Human and Physical Vulnerabilities • Exploit the Human Psyche • • • •

Using Social Engineering Phishing-Pharming Spam-Vishing- SMiShing Impersonation

• Exploiting Physical Security • Circumventing Security •

Scaling Fences

Detecting Motion

Cloning a Badge

• Gaining Access •

Bypassing Locks

Tailgating and Piggybacking

Dumpster diving

Shoulder surfing

• The Social Engineering Toolkit (SET) ©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 5 Preparing the Vulnerability Plan • Plan the Vulnerability Scan

• Understanding Vulnerabilities • Exploiting the Unknown • Reducing Risks to Data • Performing Active Reconnaissance • Banner Grabbing • Mapping the Network • Detect Defenses

• Identifying Load Balancers, Firewalls, Antivirus

Lifecycle of a vulnerability

• Utilize Scanning Tools • Shodan, Censys • Nessus, OpenVAS, Nikto

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 6 Scanning Logical Vulnerabilities

• Scan Identified Targets • Different Types of Scans • Discovering Network Hosts • Scanning Ports- Full Scan, Stealth Scan

• Evaluate Network Traffic • Sniffing Using Wireshark • Scanning With Nessus

• Gathering ARP Traffic

• Assessing Vulnerable Web Applications • Crawling Web Applications

• Uncover Wireless Assets • War Driving Open Access Points

• Automating Vulnerability Scanning • Security Content Automation Protocol (SCAP)

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

• Mapping WAP Using WiGLE

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 7 Analyzing Scanning Results • Discover Nmap and NSE • Timing and Performance Considerations • Using TCP or UDP • Scripting with Nmap • Enumerate Network Hosts • Detecting Interesting Hosts • Fingerprinting the OS • Analyze Output from Scans • Examining Network Traffic • Reporting With Nmap • Interfacing With Zenmap • Exposing Vulnerable Web Servers

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

Topology of a network as shown in Zenmap

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 8 Avoiding Detection and Covering Tracks • Evade Detection • Flying Under the Radar • Spoofing • Using a Decoy • Covering your tracks

• Using Steganography • Steghide • OpenStego • Establish a covert channel • Remote Access • Using Secure Shell • Using Proxy

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

OpenStego

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 9 Exploiting the LAN and Cloud • Enumerating Hosts • Enumerating Websites • Nmap Scripts • Attack LAN Protocols • Macof attack • MITM Attack • Pass the hash • Exploit Tools • Metasploit • Armitage

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

• Discover Cloud Vulnerabilities • Configuring Cloud Assets • Understanding Storage Vulnerabilities • Controlling Identity and Access Management

• Explore Cloud-Based Attacks • Attacking the Cloud • Harvesting Credentials • DoS Attack • Auditing the Cloud • ScoutSuite • Testing with Pacu

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 10 Testing Wireless Networks • Discover Wireless Attacks • Securing Wireless Transmissions • Gathering the Signals • Cracking the Password or PIN

• MITM Attack, Evil Twin • Explore Wireless Tools • Aircrack-ng

• Kismet • Wifite2

Fern Wi-Fi cracker

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 11 Targeting Mobile Devices • Recognize Mobile Device Vulnerabilities • Deployment Models • Controlling Access • Enterprise mobility management (EMM) • Identifying Vulnerabilities- jailbreak • Launch Attacks on Mobile Devices • Spyware, Trojans, Rootkits, Virus, Worm • Social engineering • Hacking a Bluetooth Signal • Assessment Tools • Kali Linux

Using social engineering on a mobile phone

• Mobile Security Framework (MobSF)

• Mobile Security Testing Guide (MSTG).

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 12 Attacking Specialized Systems • Identify Attacks on the IoT • Discovering the IoT • Outlining Vulnerabilities • Triggering an Attack • Recognize Other Vulnerable Systems • Understanding Data Storage Systems • Securing Control Systems • Virtual Machine Vulnerabilities • Outlining Virtual Environments • Recognizing Vulnerabilities • VM Sprawl • Hyper jacking the Hypervisor

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

IoT ecosystem

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 13 Web Application Based Attacks • Recognize Web Vulnerabilities • OWASP Top 10 • Attacks • Session Hijacking • CSRF • Escalating Privilege • SQL Injection • Directory traversal • XSS • Overview of Tools • Browser Exploitation Framework • WPScan • SQLmap • SearchSploit

SearchSploit

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 14 Performing System Hacking • System Hacking • PowerShell Scripts • Use Remote Access Tools • SSH, Telnet, rlogin • Metasploit Framework

Metasploit msvenom script creation

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 15 Scripting and Software Development • Analyzing Scripts and Code Samples • Automating Tasks Using Scripting • Bash Shell • PowerShell cmdlets • Python, Ruby, Perl, JavaScript • Create Logic Constructs • Describing Variables • Applying Logic and Flow Control • Operators • Automate Penetration Testing • Scanning Port Using Automation • Acquiring Scripts and Tools

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 16 Leveraging the Attack: Pivot and Penetrate • Test Credentials • Comparing Password Attacks • Attacking Windows & Linux Passwords • Password Cracking Tools • Move Throughout the System • Metasploit • Lateral movement • Obtaining the Hash • Escalating Privilege

• Maintain Persistence • Using Backdoors and Trojans • Scheduling Tasks

Dumping Hashes

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 17 Communicating During the Pentesting Protest • Define the Communication Path • Outlining the Communication Path • Defining Contacts • Communication Triggers • Triggering Communication Events • Recognizing Criminal Activity • Identifying False Positives • Use Built-In Tools for Reporting • Sharing Findings with Dradis • Building Reports with Nessus

An example of Tenable's Nessus' platform.

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 18 Summarizing Report Components • Identify Report Audience • Reporting to Senior Management • Including Third-Party Stakeholders • Sharing Information with Technical Staff • Providing Details to Developers • List Report Contents • Defining the Executive Summary • Stepping Through the Methodology • Detailing the Attack Narrative • Determining Risk Appetite • Analyzing Business Impact • Suggesting Remediation

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

• Define Best Practices for Reports • Storing Reports • Securing Report Distribution • Ongoing Documentation During Tests • Grabbing Screenshots • Outlining Best Practices

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 19 Recommending Remediation • Employ Technical Controls • Hardening the Systems • Implementing Multifactor Authentication • Encrypting Passwords • Patch management • Certificate management • Administrative and Operational Controls • Implementing Policies and Procedures • Enforcing Minimum Password Requirements • Managing Organizational Mobile Devices

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

• Implementing People Security Controls • Outlining Other Operational Considerations • Job Rotation • Time of Day Restrictions • Mandatory Vacations • User Training • Physical Controls • Controlling Access to Buildings • Employing Biometric Controls • Utilizing Video Surveillance

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


Lesson 20 Performing Post-Report Delivery Activities • Post-Engagement Cleanup • Removing Shells • Deleting Test Credentials • Eliminating Tools • Destroying Test Data

• Follow-Up Actions • Gaining the Client’s Acceptance • Confirming the Findings • Planning the Retest • Reviewing Lessons Learned

©©1998-2021 NetCom Learning 1998-2022 NetCom Learning

www.netcomlearning.com || info@netcomlearning.com | 1-888-563-8266 Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


RECORDED WEBINAR VIDEO To watch the recorded webinar video for live demos, please access the link: https://bit.ly/3jTzhV7

© © 1998-2022 NetComLearning Learning 1998-2021 NetCom

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com | (888) || 1-888-563-8266


ABOUT NETCOM LEARNING

100K+

14K+

3500

Professionals trained

Corporate clients

IT, Business & Soft Skillscourses

96%

8.6/9

20+

Of customers recommend us to others

Instructor evaluations

Leadingvendors recognitions

Microsoft’s

80%

Top20

Worldwide training partner of the year

Trained of the Fortune 100

ITTraining Company

© © 1998-2019 1998-2022 NetCom Learning Learning 1998-2021NetCom NetCom Learning

NetCom Learning is an award-winning global leader in managed learning services, training and talent development. Founded

: 1998

Headquarters

: New YorkCity

Delivery Capability

: Worldwide

CEO

: RussellSarder

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266


RECOMMENDED COURSES AND MARKETING ASSETS NetCom Learning offers a comprehensive portfolio for Security » COMPTIA PENTEST+ CERTIFICATION PREP (EXAM PT0-002) - Class Scheduled on May 16 » CompTIA Advanced Security Practitioner (CASP+) Certification Prep (Exam CAS-004) - Class Scheduled on May 23 » CompTIA A+ Certification Prep (Exam 220-1002) - Class Scheduled on May 16 » CompTIA Network+ Certification Prep (Exam N10-008) - Class Scheduled on May 09

You can also access the below Marketing Assets » Free 1hr Training - What Is New with CompTIA Network+ N10-008 » Free On-Demand Training - Learn the A to Z of IT Fundamentals with CompTIA A+ Certification » Blog - CompTIA Certifications: A+ vs. Linux+

© © 1998-2022 NetComLearning Learning 1998-2021 NetCom

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com | (888) || 1-888-563-8266


UPCOMING WEBINARS ▪ Microsoft 365 Master Class with FREE Access to Microsoft Official Curriculum (MS-900) ▪ AWS Discovery Day - An official introduction to the core concepts of cloud and AWS ▪ Microsoft Security, Compliance, and Identity Master Class with FREE Access to SC -900 MOC ▪ Visual Analytics: Best Practices, Sharing & Collaboration ▪ Designing the New Creative Experience for Businesses ▪ Microsoft 365: How to Build a Modern Digital Workplace ▪ AWS security: Getting started with cloud encryption ▪ What Is New with CompTIA Network+ N10-008 ▪ CCNP Enterprise Networks: Move One Step Closer to Advanced Networking ▪ How to Mitigate Malware and Ransomware Attacks Efficiently ▪ How to Migrate and Modernize with Microsoft Azure & More © © 1998-2022 NetCom Learning 1998-2019 Learning 1998-2021NetCom NetCom Learning

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266


PROMOTIONS

Free Cybersecurity Training! NetCom Learning brings an immersive two-hour, instructor-led Free Training on Cybersecurity that is designed to help businesses understand the importance of Cybersecurity in today’s digital world and gain expert insights into how security breaches can affect a business.. Learn More

© NetCom Learning 1998-2021 NetCom Learning © 1998-2019 1998-2022 NetCom Learning © 1998-2022 NetCom Learning

www.netcomlearning.com | www.netcomlearning.com 1-888-563-8266 || info@netcomlearning.com || 1-888-563-8266 www.netcomlearning.com info@netcomlearning.com Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


PROMOTIONS

Explore The World Of Unlimited Training Subscription! NetCom+ is a limitless 12-month subscription program. Attend over 500+ courses as from a range of authorized training courses. Get access to bundled offerings of Virtual Instructor-Led courses, e-Learning, Discovery Days, and On-Demand training via NetCom+ training subscription.. Save Now

© 1998-2019 NetCom Learning 1998-2021 1998-2022 NetCom Learning © 1998-2022 NetCom Learning

www.netcomlearning.com | Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com || 1-888-563-8266


PROMOTIONS

E- Learning To Skill Up ! Align and upskill your team via e-Learning to drive results! Our robust library includes Microsoft, Cisco, Citrix, CompTIA, Autodesk, and more. Our e-Learning solutions allow perfect balance among work and upskilling, without interrupting workflow. It’s all about saving time, quality learning, knowledge check, 24/7 availability. Learn More

© NetCom Learning 1998-2021 NetCom Learning © 1998-2019 1998-2022 NetCom Learning © 1998-2022 NetCom Learning

www.netcomlearning.com | www.netcomlearning.com 1-888-563-8266 || info@netcomlearning.com || 1-888-563-8266 www.netcomlearning.com info@netcomlearning.com Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com


PROMOTIONS

Access Your Passport To A Year Full Of Learning! The NetCom Learning Passport is a flexible pre-pay training package allowing you to plan and manage your teams’ annual training needs. With our Learning Passport, organizations get special pricing and extended program options to simplify management. Equipped with this Passport, you make the most of your budget. It has been specifically designed to specialize for the number of learners you plan to train.. Unlock Now

© 1998-2019 NetCom Learning 1998-2021 NetCom Learning © 1998-2022 NetCom Learning

www.netcomlearning.com | www.netcomlearning.com || info@netcomlearning.com Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com || 1-888-563-8266


PROMOTIONS

Worry-Free Training with Price Match Guarantee! Our Price Match Guarantee ensures that we'll match the offers of any other authorized training provider if you succeed at finding anyone offering the same publicly scheduled class within 30 days of our schedule at a lower regular price.. Learn More

© 1998-2019 1998-2022 NetCom Learning NetCom Learning 1998-2021 1998-2022 NetCom Learning

Interested in training? Contact us! | www.netcomlearning.com (888) 563-8266 | info@netcomlearning.com www.netcomlearning.com | www.netcomlearning.com || info@netcomlearning.com || 1-888-563-8266


FOLLOW US ON

LinkedIn

© © 1998-2019 1998-2022 NetCom Learning Learning 1998-2021NetCom NetCom Learning

Instagram

Twitter

YouTube

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266


BUILDING AN INNOVATIVE LEARNING ORG.

A BOOK FROM RUSSELL SARDER, CEO AT NETCOM LEARNING

A framework to build a smarter workforce, adapt to change and drive growth.

DOWNLOAD e-book

© © 1998-2019 1998-2022 NetCom Learning Learning 1998-2021NetCom NetCom Learning

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || www.netcomlearning.com info@netcomlearning.com | (888) || 1-888-563-8266


Thank you

© © 1998-2022 NetComLearning Learning 1998-2019 NetCom 1998-2021

Interested in training? Contact us! | www.netcomlearning.com 563-8266 | info@netcomlearning.com www.netcomlearning.com || info@netcomlearning.com www.netcomlearning.com info@netcomlearning.com | (888) | || 1-888-563-8266


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.