Companies Home Search Profile

CompTIA Network+ (N10-007) Online Training

Focused View

Keith Barker

20:39:53

88 View
  • 001 OSI Layers Ports And Protocols A Tale of Two Kings.mp4
    05:10
  • 002 OSI Layers Ports And Protocols The 7 Layers of the OSI Model.mp4
    05:23
  • 003 OSI Layers Ports And Protocols TCPIP Suite Layers.mp4
    05:49
  • 004 OSI Layers Ports And Protocols Core TCPIP Protocols.mp4
    05:18
  • 005 OSI Layers Ports And Protocols Wireshark Views of Core TCPIP Protocols.mp4
    04:47
  • 006 OSI Layers Ports And Protocols How Ports Are Used in TCPIP.mp4
    06:45
  • 007 OSI Layers Ports And Protocols Verifying L4 Ports with Wireshark.mp4
    03:23
  • 008 OSI Layers Ports And Protocols Common Protocols and Their Well-known Ports.mp4
    05:58
  • 009 OSI Layers Ports And Protocols TCPs Three-way Handshake.mp4
    05:42
  • 010 OSI Layers Ports And Protocols Wireshark Verification of a TCP 3-Way Handshake.mp4
    05:00
  • 011 Ethernet Switching Properties of Network Traffic.mp4
    05:54
  • 012 Ethernet Switching Layer 2 Ethernet Addresses.mp4
    04:50
  • 013 Ethernet Switching How a Layer 2 Switch Works.mp4
    05:37
  • 014 Ethernet Switching Demonstration Switch Dynamic Learning.mp4
    03:14
  • 015 Ethernet Switching Understanding VLANs.mp4
    03:23
  • 016 Ethernet Switching Configuring a VLAN.mp4
    05:55
  • 017 Ethernet Switching Overview of 802.1Q and Trunks.mp4
    05:53
  • 018 Ethernet Switching Configuring an 802.1Q Ethernet Trunk.mp4
    05:31
  • 019 Ethernet Switching How Address Resolution Protocol (ARP) Operates.mp4
    05:36
  • 020 Ethernet Switching Predicting the MAC Address Table.mp4
    05:46
  • 021 Ethernet Switching Validating MAC Address Table Predictions.mp4
    03:35
  • 022 Ethernet Switching Game Predict MAC Table After PC1 Pings PC4.mp4
    04:24
  • 023 Ethernet Switching Game Predict MAC Table After PC3 Pings PC5.mp4
    04:55
  • 024 Ethernet Switching Switching Loops and Spanning Tree Protocol (STP).mp4
    04:29
  • 025 Ethernet Switching STP Reacting to a Network Change.mp4
    05:27
  • 026 Ethernet Switching Design Considerations and PoE.mp4
    04:31
  • 027 Ethernet Switching Switch Port Mirroring.mp4
    03:00
  • 028 IP Routing and Forwarding Introduction to IP Routing.mp4
    05:56
  • 029 IP Routing and Forwarding How to Train a Router.mp4
    04:49
  • 030 IP Routing and Forwarding Options for Static Routes.mp4
    05:17
  • 031 IP Routing and Forwarding Configuring Static Routes.mp4
    04:52
  • 032 IP Routing and Forwarding Dynamic Routing Protocol Overview.mp4
    04:28
  • 033 IP Routing and Forwarding Dynamic Routing Protocol Demonstration.mp4
    02:22
  • 034 IP Routing and Forwarding Address Translation with PAT.mp4
    04:41
  • 035 IP Routing and Forwarding One-to-one Translations with NAT.mp4
    03:59
  • 036 IP Routing and Forwarding Using Wireshark to Verify IP Translations.mp4
    04:25
  • 037 IP Routing and Forwarding Access Control Lists.mp4
    05:42
  • 038 IP Routing and Forwarding ACL Demonstration.mp4
    04:50
  • 039 IP Routing and Forwarding Enterprise Network Forwarding.mp4
    05:31
  • 040 IP Addressing and Subnetting IPv4 Overview.mp4
    05:46
  • 041 IP Addressing and Subnetting Binary Basics.mp4
    05:43
  • 042 IP Addressing and Subnetting Converting Decimal to Binary.mp4
    05:28
  • 043 IP Addressing and Subnetting Converting Binary to Decimal.mp4
    05:44
  • 044 IP Addressing and Subnetting The IP Mask.mp4
    05:32
  • 045 IP Addressing and Subnetting Practice Using a Different IP Mask.mp4
    04:23
  • 046 IP Addressing and Subnetting Borrowing Host Bits.mp4
    15:29
  • 047 IP Addressing and Subnetting Practicing the Finger Game.mp4
    04:33
  • 048 IP Addressing and Subnetting Identifying New Subnets.mp4
    05:36
  • 049 IP Addressing and Subnetting Exercise 1 Identify the New Subnets.mp4
    05:50
  • 050 IP Addressing and Subnetting Exercise 2 Identify the New Subnets.mp4
    02:55
  • 051 IP Addressing and Subnetting ID Valid Host Addresses on a Subnet.mp4
    05:36
  • 052 IP Addressing and Subnetting Exercise 1 ID Valid Host Addresses.mp4
    05:48
  • 053 IP Addressing and Subnetting Exercise 2 ID Valid Host Addresses.mp4
    05:07
  • 054 IP Addressing and Subnetting Calculate the Number of Hosts per Subnet.mp4
    05:57
  • 055 IP Addressing and Subnetting Determine the Subnet Based on a Hosts IP Address.mp4
    05:51
  • 056 IP Addressing and Subnetting Planning and Assigning IP Addresses.mp4
    05:59
  • 057 IP Addressing and Subnetting Test Your IPv4 Knowledge Lab.mp4
    10:33
  • 058 IP Addressing and Subnetting IPv6 Concepts.mp4
    05:38
  • 059 Network Topologies Wired Topologies.mp4
    06:13
  • 060 Network Topologies Wireless Topologies.mp4
    04:55
  • 061 Network Topologies Types of Networks.mp4
    05:59
  • 062 Network Topologies Introducing the Internet of Things (IoT).mp4
    05:48
  • 063 Network Topologies Internet of Things (IoT) Technologies.mp4
    04:42
  • 064 Wireless Technologies and Configurations The Purpose of Wireless.mp4
    04:23
  • 065 Wireless Technologies and Configurations Understanding Radio Frequency.mp4
    06:36
  • 066 Wireless Technologies and Configurations Understanding Radio Channels.mp4
    08:01
  • 067 Wireless Technologies and Configurations Wireless Communication Technologies.mp4
    06:53
  • 068 Wireless Technologies and Configurations Designing for Wireless Speed and Coverage.mp4
    08:13
  • 069 Wireless Technologies and Configurations Understanding Wireless Antennas.mp4
    05:24
  • 070 Wireless Technologies and Configurations Wireless Performance Improvements.mp4
    07:27
  • 071 Cloud Concepts Types of Services.mp4
    05:41
  • 072 Cloud Concepts Cloud Delivery Models.mp4
    03:55
  • 073 Cloud Concepts Connectivity Methods.mp4
    05:25
  • 074 Cloud Concepts Security Implications Considerations.mp4
    05:51
  • 075 Cloud Concepts Local and Cloud Resource Relationships.mp4
    04:56
  • 076 Network Services DHCP Overview.mp4
    05:55
  • 077 Network Services Verify DHCP with Wireshark.mp4
    03:01
  • 078 Network Services DNS Overview.mp4
    03:23
  • 079 Network Services DNS Methods Records and Design Options.mp4
    05:57
  • 080 Network Services DNS Testing and Validation.mp4
    03:42
  • 081 Network Services Network Time Protocol (NTP).mp4
    05:15
  • 082 Network Services IP Address Management (IPAM).mp4
    03:22
  • 083 Deploying Appropriate Cabling Solutions Copper Network Media Types.mp4
    07:59
  • 084 Deploying Appropriate Cabling Solutions Fiber Network Media Types.mp4
    06:57
  • 085 Deploying Appropriate Cabling Solutions Network Termination Points.mp4
    09:34
  • 086 Deploying Appropriate Cabling Solutions Network Transceivers.mp4
    08:14
  • 087 Device Placement and Configuration Network Device Placement.mp4
    05:46
  • 088 Device Placement and Configuration Device Configuration Overview.mp4
    05:53
  • 089 Device Placement and Configuration Configure Switch Ports Lab.mp4
    06:25
  • 090 Device Placement and Configuration Configure IP Addresses Lab.mp4
    05:12
  • 091 Device Placement and Configuration Configure IP Routing Lab.mp4
    06:15
  • 092 Device Placement and Configuration Configuring DHCP Services Lab.mp4
    05:39
  • 093 Device Placement and Configuration Configuring a VLAN Interface Lab.mp4
    06:56
  • 094 Device Placement and Configuration Configuring NAT Lab.mp4
    06:20
  • 095 Advanced Networking Devices Multi-Layer Switch Overview.mp4
    05:58
  • 096 Advanced Networking Devices Configure Multi-Layer Switch Lab.mp4
    05:45
  • 097 Advanced Networking Devices Load Balancer Overview.mp4
    03:59
  • 098 Advanced Networking Devices IDS and IPS.mp4
    05:11
  • 099 Advanced Networking Devices Proxy Servers and Content Filtering.mp4
    03:27
  • 100 Advanced Networking Devices Security Network Devices.mp4
    04:56
  • 101 Advanced Networking Devices AAARADIUS Server.mp4
    03:54
  • 102 Advanced Networking Devices VoIP PBX and Gateway.mp4
    03:20
  • 103 Advanced Networking Devices Wireless Controller.mp4
    03:02
  • 104 Virtualization And Network Storage Hypervisor Introduction.mp4
    05:49
  • 105 Virtualization And Network Storage Virtual Networking Components.mp4
    04:05
  • 106 Virtualization And Network Storage Creating a Virtual Switch and VM Lab.mp4
    03:25
  • 107 Virtualization And Network Storage Network Storage.mp4
    05:10
  • 108 WAN Technologies Understanding the LAN MAN and WAN Difference.mp4
    05:17
  • 109 WAN Technologies WAN Transmission over Copper Fiber Wireless and Satellite.mp4
    03:55
  • 110 WAN Technologies WAN Types ISDNPRI T1-T3 E1-E3 and OC.mp4
    10:05
  • 111 WAN Technologies WAN Types Cable DSL Dial-up.mp4
    06:14
  • 112 WAN Technologies WAN Characteristics Frame Relay ATM MPLS and DMVPN.mp4
    08:55
  • 113 WAN Technologies What is PPP and PPPoE.mp4
    05:20
  • 114 WAN Technologies What is SIP Trunking.mp4
    06:50
  • 115 WAN Technologies The Physical Reality of a WAN Connection.mp4
    04:56
  • 116 Network Diagram And Documentation Network Documentation is Fun!.mp4
    05:55
  • 117 Network Diagram And Documentation Creating Logical Network Diagrams.mp4
    05:25
  • 118 Network Diagram And Documentation Creating Physical Diagrams.mp4
    05:10
  • 119 Network Diagram And Documentation Naming Conventions and Labeling.mp4
    07:11
  • 120 Network Diagram And Documentation Documenting Wiring and Port Locations.mp4
    05:46
  • 121 Network Diagram And Documentation SOPs and Work Instructions.mp4
    06:53
  • 122 Network Diagram And Documentation Network Change Management.mp4
    05:08
  • 123 Network Diagram And Documentation Configuration and Monitoring Baselines.mp4
    07:09
  • 124 Network Diagram And Documentation Inventory Management.mp4
    04:07
  • 125 Business Continuity Availability Concepts.mp4
    05:17
  • 126 Business Continuity Load Sharing and Balancing.mp4
    06:00
  • 127 Business Continuity Power Management.mp4
    02:51
  • 128 Business Continuity Site Recovery Options.mp4
    05:15
  • 129 Business Continuity Backups.mp4
    07:43
  • 130 Business Continuity Backup and Restore Hands On Lab.mp4
    14:15
  • 131 Business Continuity MTTR and MTBF.mp4
    03:58
  • 132 Business Continuity SLA Requirements.mp4
    02:49
  • 133 Scanning Monitoring And Patching Scanning Overview.mp4
    02:56
  • 134 Scanning Monitoring And Patching Network Scanning Methodology.mp4
    03:20
  • 135 Scanning Monitoring And Patching Port Scanning and Discovery.mp4
    04:31
  • 136 Scanning Monitoring And Patching OS Discovery and Fingerprinting.mp4
    05:50
  • 137 Scanning Monitoring And Patching Motivators for Vulnerability Management.mp4
    04:35
  • 138 Scanning Monitoring And Patching Vulnerability Scanning.mp4
    05:00
  • 139 Scanning Monitoring And Patching Logging and Review.mp4
    05:52
  • 140 Scanning Monitoring And Patching Packet and Traffic Analysis.mp4
    04:43
  • 141 Scanning Monitoring And Patching Packet Capture and Analysis Lab.mp4
    10:34
  • 142 Scanning Monitoring And Patching Remediation and Patch Management.mp4
    05:55
  • 143 Scanning Monitoring And Patching Network Scanning with NMAP and Zenmap Lab.mp4
    17:36
  • 144 Scanning Monitoring And Patching Baselines.mp4
    04:04
  • 145 Remote Access Methods Telnet and SSH for CLI Remote Access.mp4
    04:29
  • 146 Remote Access Methods HTTPS Management URLs.mp4
    03:03
  • 147 Remote Access Methods VPNs.mp4
    05:28
  • 148 Remote Access Methods Remote Desktop Access.mp4
    04:06
  • 149 Remote Access Methods Out-of-Band Management.mp4
    05:06
  • 150 Identify Policies And Best Practices Privileged User Agreement.mp4
    04:00
  • 151 Identify Policies And Best Practices Password Policy.mp4
    03:44
  • 152 Identify Policies And Best Practices On-boarding and Off-boarding.mp4
    06:41
  • 153 Identify Policies And Best Practices Licensing Restrictions.mp4
    04:35
  • 154 Identify Policies And Best Practices International Export Controls.mp4
    03:25
  • 155 Identify Policies And Best Practices Data Loss Prevention.mp4
    04:07
  • 156 Identify Policies And Best Practices Remote Access Policies.mp4
    03:52
  • 157 Identify Policies And Best Practices Incident Response Policies.mp4
    05:03
  • 158 Identify Policies And Best Practices Bring Your Own Device (BYOD).mp4
    05:12
  • 159 Identify Policies And Best Practices Acceptable Use Policy (AUP).mp4
    03:34
  • 160 Identify Policies And Best Practices Non-disclosure Agreements (NDA).mp4
    04:02
  • 161 Identify Policies And Best Practices System Life Cycle.mp4
    04:24
  • 162 Identify Policies And Best Practices Safety Procedures and Policies.mp4
    02:32
  • 163 Physical Security And Network Attacks Lets Break into a Data Center.mp4
    02:22
  • 164 Physical Security And Network Attacks Video Surveillance and Motion Detection.mp4
    05:28
  • 165 Physical Security And Network Attacks Badges and Smart Cards.mp4
    05:12
  • 166 Physical Security And Network Attacks Biometrics.mp4
    05:09
  • 167 Physical Security And Network Attacks Locks Asset Tags and Tamper Detection.mp4
    05:28
  • 168 Physical Security And Network Attacks DoS and PDoS (Permanent Denial of Service).mp4
    04:18
  • 169 Physical Security And Network Attacks DDoS (Distributed Denial of Service).mp4
    04:33
  • 170 Physical Security And Network Attacks DDoS with ICMP and Smurfing.mp4
    03:19
  • 171 Physical Security And Network Attacks DDoS with DNS and NTP.mp4
    03:59
  • 172 Physical Security And Network Attacks Lets Go Phishing.mp4
    04:01
  • 173 Physical Security And Network Attacks Social Engineering and Insider Threats.mp4
    04:35
  • 174 Physical Security And Network Attacks Ransomware and Scareware.mp4
    04:07
  • 175 Physical Security And Network Attacks Cryptolocker and Logic Bombs.mp4
    05:43
  • 176 Physical Security And Network Attacks DNS Spoofing (Poisoning).mp4
    05:55
  • 177 Physical Security And Network Attacks Man-In-The-Middle with ARP Spoofing.mp4
    05:51
  • 178 Physical Security And Network Attacks Wardriving and Deauthentication.mp4
    05:32
  • 179 Physical Security And Network Attacks Evil Twins and Rogue Access Points.mp4
    04:59
  • 180 Authentication And Access Control AAA.mp4
    05:43
  • 181 Authentication And Access Control Multi-factor Authentication Overview.mp4
    04:44
  • 182 Authentication And Access Control Using Two-Factor Authentication (2FA).mp4
    04:46
  • 183 Authentication And Access Control Demo Implementing 2FA.mp4
    05:48
  • 184 Authentication And Access Control Switch Port Security.mp4
    02:52
  • 185 Authentication And Access Control Access Control Methods.mp4
    03:37
  • 186 Basic Wireless Network Security The Wireless Security Evolution.mp4
    06:51
  • 187 Basic Wireless Network Security Wireless Authentication and Authorization Types.mp4
    06:56
  • 188 Mitigation Techniques Network Device Hardening.mp4
    05:55
  • 189 Mitigation Techniques Hardening a Windows Server System.mp4
    04:12
  • 190 Mitigation Techniques Signature Management.mp4
    03:11
  • 191 Mitigation Techniques File Integrity Monitoring.mp4
    04:31
  • 192 Mitigation Techniques Privileged User Accounts and Role Separation.mp4
    05:14
  • 193 Mitigation Techniques Network Segmentation.mp4
    04:08
  • 194 Mitigation Techniques Switch Port Protections.mp4
    06:46
  • 195 Mitigation Techniques The Native VLAN.mp4
    04:58
  • 196 Mitigation Techniques Filtering with Access Control Lists (ACLs).mp4
    06:21
  • 197 Mitigation Techniques Honeypots and Honeynets.mp4
    03:23
  • 198 Mitigation Techniques Penetration Testing.mp4
    05:01
  • 199 Troubleshooting Methodology A Network Troubleshooting Methodology.mp4
    04:12
  • 200 Troubleshooting Methodology Identify the Problem.mp4
    04:04
  • 201 Troubleshooting Methodology Establish a Theory of Probable Cause.mp4
    05:29
  • 202 Troubleshooting Methodology Test the Theory to Determine the Root Cause.mp4
    03:37
  • 203 Troubleshooting Methodology Establish a Plan of Action to Solve the Problem.mp4
    04:09
  • 204 Troubleshooting Methodology Problem Solving Verification and Documentation.mp4
    04:42
  • 205 Network Troubleshooting Hardware Tools.mp4
    08:33
  • 206 Network Troubleshooting Software Tools.mp4
    08:38
  • 207 Network Troubleshooting Using CLI Network Tools ipconfig ping arp.mp4
    08:34
  • 208 Network Troubleshooting Using CLI Network Tools nslookup dig.mp4
    07:30
  • 209 Network Troubleshooting Using CLI Network Tools tracert pathping nmap route.mp4
    09:07
  • 210 Network Troubleshooting Using CLI Network Tools ifconfig iptables tcpdump and netstat.mp4
    06:58
  • 211 Wired Connectivity And Performance Issues Attenuation Latency and Jitter.mp4
    05:49
  • 212 Wired Connectivity And Performance Issues Crosstalk EMI OpenShort.mp4
    05:32
  • 213 Wired Connectivity And Performance Issues Incorrect Pin-Outs or Cable Types.mp4
    04:27
  • 214 Wired Connectivity And Performance Issues Mismatched and Damaged Cables.mp4
    03:20
  • 215 Wired Connectivity And Performance Issues Bad Ports and LED Status Indicators.mp4
    04:59
  • 216 Wired Connectivity And Performance Issues Duplex and Speed Mismatches.mp4
    04:41
  • 217 Wired Connectivity And Performance Issues VLAN Mismatches.mp4
    07:28
  • 218 Wired Connectivity And Performance Issues Native VLAN Mismatches.mp4
    05:49
  • 219 Wired Connectivity And Performance Issues Bottlenecks.mp4
    05:13
  • 220 Troubleshooting Wireless The Nature of Airwaves.mp4
    06:55
  • 221 Troubleshooting Wireless Fighting Frequencies.mp4
    08:50
  • 222 Troubleshooting Wireless Understanding Antenna Types.mp4
    05:31
  • 223 Troubleshooting Wireless Misconfigurations.mp4
    07:19
  • 224 Common Network Service Issues Troubleshooting Name Resolution.mp4
    06:35
  • 225 Common Network Service Issues Troubleshooting MAC Addressing.mp4
    05:28
  • 226 Common Network Service Issues Troubleshooting IP Addressing.mp4
    05:42
  • 227 Common Network Service Issues Troubleshooting Security Settings.mp4
    05:21
  • 228 Common Network Service Issues Troubleshooting Miscellaneous Service Issues.mp4
    05:27
  • Description


    In this entry-level CompTIA skills training, Keith Barker, Anthony Sequeira, Jeremy Cioara, and Chuck Keith step through the exam objectives on the N10-007 exam, which is the one required exam to earn the CompTIA Network+ certification.

    More details


    Network+ is the perfect starting point for anyone brand new to IT. It’s a good stepping stone to higher-level Cisco or Juniper certifications and provides a good overview of fundamental IT networking knowledge and skills. Even if you don’t plan to take the Network+ exam, the knowledge and skills covered in this Network+ training are invaluable. A fundamental understanding of networking is essential for any IT professional — regardless of where your career takes you.

    After finishing the videos in this Network+ training, you'll know how to configure, manage, secure, and troubleshoot wired and wireless networks as you prepare for the N10-007.

    For managers with CompTIA products, this CompTIA training can be used for N10-007 exam prep, onboarding new network administrators, individual or team training plans, or as a CompTIA reference resource.

    Network+: What You Need to Know

    This CompTIA Network+ training maps to the N10-007 networking technologies exam objectives and covers topics such as:

    • Mastering OSI layers, ports & protocols
    • Managing and configuring elements of ethernet switching
    • Integrating IP routing and forwarding, addressing and subnetting
    • Understanding network topologies
    • Configuring wireless technologies
    • Navigating cloud concepts
    • Implementing network services
    • Using advanced networking devices
    • Planning, diagramming and documenting networks
    • Scanning, monitoring and patching
    • Authenticating traffic and securing networks

    Who Should Take Network+ Training?

    This Network+ training is considered entry-level CompTIA training, which means it was designed for new IT professionals. This course is valuable for new IT professionals with at least a year of experience with routing and switching, and experienced network administrators looking to validate their basic networking skills.

    New or aspiring network administrators. If you’re new to network administration, you probably haven’t yet made a name for yourself in one of the many niches that exist for network administrators to excel within. Eventually in your career, you’ll deal with replacing and updating hardware, integrating cloud computing, and anticipating security vulnerabilities, and this training can prepare you for all of it. Developed to help you eventually earn your Network+ (N10-007) certification from CompTIA, it’ll make you a network administration pro.

    Experienced network administrators. If you’re a network administrator with several years of experience, you’ve realized by now the need for familiarity with all manner of networking devices and solutions. No company needs someone to configure and manage only one network device. There are mobile, cloud, virtualization, and wireless devices that need security, hardware and software expertise. The Network+ (N10-007) certification from CompTIA can prove your mastery of these topics and this training can prepare you for it.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Keith Barker
    Keith Barker
    Instructor's Courses

    The best part of being a trainer is making a difference in the life of a student. When a motivated learner and the correct training meet at the right time, the results are amazing.

    Keith Barker discovered a love for computers and networking in 1984 and began his IT career in 1985 at Electronic Data Systems (EDS). He has worked with companies including Paramount Pictures, Blue Cross, and several government agencies. Keith loves to teach and spends most of his time creating fun and useful videos for CBT Nuggets.

    Certifications: Cisco CCIE (2x), CISSP, Network+, Security+, VMware, Palo Alto, Check Point

    Areas of expertise: Networking and Security

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 228
    • duration 20:39:53
    • English subtitles has
    • Release Date 2023/07/16