Companies Home Search Profile

Linux Professional Institute Security Essentials (020-100) Online Training

Focused View

James Conrad

19:54:58

440 View
  • 1.Course Introduction1C30C.mp4
    04:44
  • 2.IT Goal Making Resources Available1C30C.mp4
    06:14
  • 3.IT Goal Making Resources Secure1C30C.mp4
    10:34
  • 4.Four Pillars of Security1C30C.mp4
    07:41
  • 5.Common Hacker Goals1C30C.mp4
    05:54
  • 6.Types of Hackers1C30C.mp4
    05:54
  • 7.Validation1C30C.mp4
    03:00
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Anonymous Hacking Group.txt
  • 1.Zero-Day and Bug Bounty 1C30C.mp4
    08:08
  • 2.Privilege Escalation1C30C.mp4
    10:20
  • 3.1C30C.mp4
    09:46
  • 4.Privilege Escalation Demo1C30C.mp4
    04:46
  • 5.1C30C.mp4
    09:43
  • 6.Penetration Testing1C30C.mp4
    12:10
  • 7.ISMS IRPs and CERT1C30C.mp4
    04:29
  • 8.1C30C.mp4
    03:00
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-APTs by Nation-State Actors.txt
  • saved url-Analysis of drive-by malware.txt
  • saved url-Atomic Wallet 1 Million Dollar Bounty.txt
  • saved url-Bounty Earnings.txt
  • saved url-Carnegie Mellon Official CERT Page.txt
  • saved url-Common APTs.txt
  • saved url-Drive-by Download.txt
  • saved url-Introduction to Bug Bounty.txt
  • saved url-NIST Vulnerability Database.txt
  • saved url-Original CVE Site from Mitre.txt
  • saved url-What is a CERT .txt
  • 1.Intro IT Access and Responsibility1C30C.mp4
    09:03
  • 2.Case Study Edward Snowden1C30C.mp4
    07:20
  • 3.Personal and Private Data1C30C.mp4
    10:34
  • 4.Web Data Visibility1C30C.mp4
    08:11
  • 5.Regulatory Compliance1C30C.mp4
    08:00
  • 6.Example of Data Breach Disclosure1C30C.mp4
    04:09
  • 7.Your Data on Social Media1C30C.mp4
    04:55
  • 8.Handling Potentially Illegal Information1C30C.mp4
    04:39
  • 9.Validation1C30C.mp4
    03:46
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • Question 13-question.txt
  • saved url-Edward Snowden Data Leak.txt
  • saved url-Edward Snowden Interview.txt
  • saved url-Ten Things to Know About Instagrams TOS.txt
  • saved url-Who Owns Your Content and How Can it Be Used .txt
  • 1.Describe Encryption and its Use1C30C.mp4
    07:35
  • 2.Encrypt Data at Rest1C30C.mp4
    17:11
  • 3.Encrypt Data in Transit1C30C.mp4
    12:38
  • 4.Data in Use1C30C.mp4
    13:00
  • 5.Validation1C30C.mp4
    04:11
  • 17.zip
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • saved url-A Robot Stealing Data from RAM.txt
  • saved url-Cryptomator.txt
  • saved url-How Hackers Scrape RAM.txt
  • saved url-Keepass Weakness.txt
  • saved url-VeraCrypt Disk Encryption.txt
  • saved url-Windows 11.txt
  • 1.The Symmetric Encryption Concept1C30C.mp4
    05:40
  • 2.The Case for Symmetric Encryption1C30C.mp4
    08:59
  • 3.Symmetric Encryption Details1C30C.mp4
    09:41
  • 4.Symmetric Encryption Algorithms1C30C.mp4
    04:46
  • 6.Perfect Forward Secrecy1C30C.mp4
    02:14
  • 7.RSA and ECC Encryption Algorithms1C30C.mp4
    04:07
  • 8.Validation1C30C.mp4
    04:19
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-How AES Works.txt
  • saved url-How Secure is AES Against Brute Force.txt
  • saved url-The AES Symmetric Block Cipher.txt
  • saved url-Understanding the Diffie Helman Key Exchange Process.txt
  • 1.Understanding PKI Operation1C30C.mp4
    10:47
  • 2.Identifying and Extracting a Web Cert1C30C.mp4
    06:39
  • 3.Handling Untrusted Certificates1C30C.mp4
    09:36
  • 4.Certificate Signing Requests1C30C.mp4
    16:56
  • 5.Validation1C30C.mp4
    04:50
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • saved url-Test various types of web certs.txt
  • 1.X.509 Concepts and Fields1C30C.mp4
    02:13
  • 2.Obtaining and Using Web Certificates1C30C.mp4
    09:34
  • 3.How SSL TLS Operate1C30C.mp4
    09:24
  • 4.Hash Data1C30C.mp4
    15:30
  • 5.Compare Hashing and Encryption1C30C.mp4
    02:46
  • 6.Validation1C30C.mp4
    06:28
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-Get free 90-day certificates for your web server.txt
  • saved url-Instructions to install certs on your webserver.txt
  • saved url-Understanding the shadow file.txt
  • saved url-this site.txt
  • saved url-this site .txt
  • 1.PGP and GPG Overview1C30C.mp4
    05:19
  • 2.Configure Thunderbird for OpenPGP1C30C.mp4
    16:17
  • 3.Encrypt and Sign Email with PGP1C30C.mp4
    10:27
  • 4.Encrypt and Sign Email with S MIME1C30C.mp4
    09:34
  • 5.Encryption and Gmail1C30C.mp4
    03:31
  • 6.Validation1C30C.mp4
    01:54
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • saved url-Actalis Italian.txt
  • saved url-FlowCrypt.txt
  • saved url-Free email certificate for S MIME.txt
  • saved url-PGP Encrypted email.txt
  • saved url-PGP Tool.txt
  • saved url-PGP Tool to issue keys.txt
  • saved url-Skiff encrypted email.txt
  • 1.1C30C.mp4
    10:21
  • 2.Motherboard Overview1C30C.mp4
    03:18
  • 3.Motherboard Diagram1C30C.mp4
    08:21
  • 4.Motherboard Form Factors and BIOS1C30C.mp4
    13:16
  • 5.Processors1C30C.mp4
    08:01
  • 6.Memory (RAM)1C30C.mp4
    04:01
  • 7.Hard Disk Drive Physical Characteristics1C30C.mp4
    07:04
  • 8.Solid State Drive Characteristics1C30C.mp4
    06:37
  • 9.Peripherals and Other Miscellaneous Devices1C30C.mp4
    03:09
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • saved url-Motherboard Form Factors.txt
  • 1.Firmware and its Risks1C30C.mp4
    10:49
  • 2.Mobile Software1C30C.mp4
    07:14
  • 3.Jailbreaking Rooting and the Risks1C30C.mp4
    10:05
  • 4.Securing Applications and Operating Systems1C30C.mp4
    08:36
  • 5.1C30C.mp4
    10:27
  • 6.Protection via Isolation1C30C.mp4
    09:06
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Apple policy on jailbreaking.txt
  • saved url-Windows Sandbox.txt
  • 1.Update Mobile Devices1C30C.mp4
    05:53
  • 2.Update Linux Devices1C30C.mp4
    09:30
  • 3.Update Windows1C30C.mp4
    06:25
  • 4.Buffer Overflow1C30C.mp4
    04:33
  • 5.SQL Injection1C30C.mp4
    04:59
  • 6.Implement Firewall Protection1C30C.mp4
    17:13
  • 7.Validation1C30C.mp4
    06:01
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • saved url-Windows 11.txt
  • 1.Common Types of Malware Part 11C30C.mp4
    09:24
  • 2.Common Types of Malware Part 21C30C.mp4
    09:38
  • 3.Camera Microphone Hijacking1C30C.mp4
    04:17
  • 4.Symptoms of Malware1C30C.mp4
    08:28
  • 5.Understanding Virus and Malware Scanners1C30C.mp4
    07:54
  • 6.Validation1C30C.mp4
    10:30
  • 7.Hands-On Lab or Other Video1C30C.mp4
    05:26
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Bonzi Buddy.txt
  • saved url-Caesars and MGM Ransomware Attack.txt
  • saved url-Microsoft Endpoint Protection.txt
  • 1.Understand the Importance of Backups1C30C.mp4
    09:15
  • 2.Recovery Point Objective and Recovery Time Objective1C30C.mp4
    05:55
  • 3.1C30C.mp4
    05:55
  • 4.Backup Location Strategy1C30C.mp4
    03:22
  • 5.Backup Type Full1C30C.mp4
    05:40
  • 6.1C30C.mp4
    04:44
  • 7.Backup Type Differential1C30C.mp4
    08:03
  • 8.Backup Type Incremental1C30C.mp4
    04:52
  • 9.Backup Media and Drives1C30C.mp4
    11:04
  • 10.Backup Security1C30C.mp4
    08:40
  • 11.Backup Solutions1C30C.mp4
    05:44
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • saved url-Dropbox Security.txt
  • saved url-Iron Mountain.txt
  • saved url-OneDrive Security.txt
  • saved url-Retention policy Dropbox.txt
  • saved url-Spectra Data Archive.txt
  • saved url-Tape Library.txt
  • saved url-Windows Server 2022.txt
  • saved url-iCloud Security.txt
  • 1.Network Equipment1C30C.mp4
    12:05
  • 2.IP Basics1C30C.mp4
    07:56
  • 3.Binary Subnet Masks1C30C.mp4
    09:28
  • 4.Classful Subnet Masks and Private IP Addresses1C30C.mp4
    04:22
  • 5.Routing Network Traffic1C30C.mp4
    03:59
  • 6.Switch Traffic1C30C.mp4
    05:35
  • 7.Validation1C30C.mp4
    02:46
  • IP Addressing.txt
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • 1.TCP and UDP Vulnerabilities1C30C.mp4
    07:32
  • 2.TCP and UDP Ports1C30C.mp4
    06:07
  • 3.Other Common Protocol Vulnerabilities1C30C.mp4
    07:39
  • 4.Validation1C30C.mp4
    05:40
  • 5.Hands-On Lab or Other Video1C30C.mp4
    12:02
  • 6.Hands-On Lab or Other Video1C30C.mp4
    04:32
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • saved url-Open Ports and Their Vulnerabilities.txt
  • 1.Introduction1C30C.mp4
    00:42
  • 2.Understanding DHCP1C30C.mp4
    11:47
  • 3.Understanding DNS1C30C.mp4
    07:54
  • 4.Forward and Reverse DNS1C30C.mp4
    07:48
  • 5.IPv6 Addresses1C30C.mp4
    06:31
  • 6.Understanding the Cloud1C30C.mp4
    09:21
  • 7.1C30C.mp4
    09:31
  • 8.A Quick Tour of Azure1C30C.mp4
    06:44
  • 9.The Cloud - Its Not Just in the Sky!1C30C.mp4
    08:09
  • 10.IaaS PaaS and SaaS1C30C.mp4
    02:14
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • Question 11-question.txt
  • Question 12-question.txt
  • saved url-How Many IPv6 Addresses .txt
  • saved url-Microsoft Datacenters.txt
  • saved url-Pizza as a Service.txt
  • saved url-Project Natik.txt
  • saved url-Underwater Datacenter.txt
  • 1.Wired Equivalency Protocol (WEP)1C30C.mp4
    08:01
  • 2.1C30C.mp4
    08:03
  • 3.WiFi Protected Access (WPA) + WPA2 and WPA31C30C.mp4
    03:05
  • 4.WiFi Passwords1C30C.mp4
    17:18
  • 5.1C30C.mp4
    02:58
  • 6.Configure WiFi Security1C30C.mp4
    02:33
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • saved url-Netspot WiFi Survey Tool.txt
  • 1.Virtual Private Network (VPN) Overview1C30C.mp4
    03:48
  • 2.VPN Common Uses1C30C.mp4
    10:10
  • 3.Common VPN Features1C30C.mp4
    07:40
  • 4.VPN Disadvantages1C30C.mp4
    04:42
  • 5.Proxy Servers1C30C.mp4
    05:39
  • 6.The Onion Router (TOR)1C30C.mp4
    12:24
  • 7.Validation1C30C.mp4
    01:56
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Download Tor Browser.txt
  • saved url-More Details about Tor.txt
  • saved url-Starting point for finding .onion sites.txt
  • 1.Authentication1C30C.mp4
    15:21
  • 2.Using a Security Key1C30C.mp4
    07:02
  • 3.Windows Hello Facial and Fingerprint Recognition1C30C.mp4
    03:40
  • 4.Security Questions and Account Recovery Tools1C30C.mp4
    08:34
  • 5.Authorization and Accounting1C30C.mp4
    10:01
  • 6.Validation1C30C.mp4
    01:05
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • 1.Password Practices to Avoid1C30C.mp4
    09:51
  • 2.Password Best Practices1C30C.mp4
    09:02
  • 3.1C30C.mp4
    12:00
  • 4.How Passwords are Stored1C30C.mp4
    08:49
  • 5.Common Attacks Against Passwords1C30C.mp4
    01:45
  • 6.Password Leaks1C30C.mp4
    08:25
  • 7.Using a Password Manager1C30C.mp4
    01:38
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • Question 10-question.txt
  • saved url-Explanation of Rainbow Tables.txt
  • saved url-Free Rainbow Tables.txt
  • saved url-KeePass.txt
  • saved url-Password Complexity.txt
  • 1.The Email & Marketing Landscape 1C30C.mp4
    08:28
  • 2.Spam and its Impact1C30C.mp4
    07:00
  • 3.Spam Filters1C30C.mp4
    09:50
  • 4.Handling Attachments and Links1C30C.mp4
    06:34
  • 5.Advantages of Messaging Apps1C30C.mp4
    02:53
  • 6.Social Media Messaging1C30C.mp4
    04:11
  • 7.E2EE Messaging Apps1C30C.mp4
    04:19
  • 8.Validation1C30C.mp4
    05:20
  • 9.Hands-On Lab or Other Video1C30C.mp4
    01:47
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • saved url-Spam Statistics.txt
  • 1.Introduction to Social Engineering1C30C.mp4
    06:26
  • 2.Social Engineering Psychology1C30C.mp4
    12:24
  • 3.Social Engineering Attacks1C30C.mp4
    13:47
  • 4.Social Engineering Improvements and Protection1C30C.mp4
    07:16
  • 5.Data Classification and NDAs1C30C.mp4
    04:07
  • 6.Validation1C30C.mp4
    02:36
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • Question 9-question.txt
  • 1.Where is Personal Data Exposed 1C30C.mp4
    05:58
  • 2.Cyberbullying1C30C.mp4
    04:25
  • 3.Cyberstalking1C30C.mp4
    03:53
  • 4.Cybermobbing Doxxing and Fraudulent Accounts1C30C.mp4
    05:49
  • 5.Cookie Handling1C30C.mp4
    09:26
  • 6.Browser Privacy Settings1C30C.mp4
    08:19
  • 7.Browser Security Settings1C30C.mp4
    05:11
  • 8.Validation1C30C.mp4
    02:09
  • Question 1-question.txt
  • Question 2-question.txt
  • Question 3-question.txt
  • Question 4-question.txt
  • Question 5-question.txt
  • Question 6-question.txt
  • Question 7-question.txt
  • Question 8-question.txt
  • saved url-Ethical Behavior.txt
  • More details


    This entry-level Linux Professional Institute Security Essentials (020-100) training prepares cybersecurity professionals to implement best practices in security maintenance, identify vulnerabilities, and respond effectively to incidents in Linux-based IT infrastructures.

    If you want a career in cybersecurity, you should plan on eventually mastering Linux security. The Linux operating system or permutations of it exist on networks all over the world — sometimes powering entire networks and other times running individual devices. It's a fundamental skill of a security professional to know the ins and outs of Linux security, and that's exactly what this course gives you.

    You'll learn the basics of cybersecurity that apply in any environment, as well as the techniques and tools that are particular to Linux environments. The LPI Security Essentials is an excellent start for a career in cybersecurity, and this course will prepare you for it in the fastest way possible.

    After completing this Linux training you'll know how to implement best practices in security maintenance, identify vulnerabilities, and respond effectively to incidents in Linux-based IT infrastructures.

    For anyone who manages their Linux training, this Linux training can be used to onboard new cybersecurity professionals, curated into individual or team training plans, or as a Linux reference resource.

    Linux Professional Institute Security Essentials (020-100): What You Need to Know

    This Linux Professional Institute Security Essentials (020-100) training has videos that cover topics such as:

    • Understanding the theoretical fundamentals of network security
    • Securing and configuring Linux systems and devices running Linux
    • Monitoring systems and networks for unusual or malicious activity
    • Responding to and reporting incidents
    • Managing secure network communications

    Who Should Take Linux Professional Institute Security Essentials (020-100) Training?

    This Linux Professional Institute Security Essentials (020-100) training is considered entry-level Linux training, which means it was designed for cybersecurity professionals. This basic security essentials skills course is valuable for new IT professionals with at least a year of experience with cybersecurity and experienced cybersecurity professionals looking to validate their Linux skills.

    New or aspiring cybersecurity professionals. At the start of your cybersecurity career, you have to make some hard choices about where to invest your time and money while learning systems and technologies. This course is an obvious choice because it covers general and foundational knowledge without getting too in the weeds, and Linux is used on networks of all sizes all over the world.

    Experienced cybersecurity professionals. If you plan on continuing your cybersecurity career, earning the LPI Security Essentials certification is an excellent way to demonstrate commitment to global standards and professionalism. Your previous experience will prepare you for most of what you'll find on the 020-100, but this course will quickly round out any rough patches and prepare you for the cert.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    James Conrad
    James Conrad
    Instructor's Courses

    I really enjoy teaching someone a topic that was difficult for me to learn so they don’t have to go through the same pain that I did while learning that topic.

    James brings more than 30 years of IT experience to his training. He got his start in IT volunteering for a nonprofit and becoming their defacto IT pro — while using an MS-DOS portable computer. Before joining CBT Nuggets, James did freelance IT work, and wrote and reviewed technical books. His hobbies include photography, hiking, and traveling, especially to Eastern Europe and Russia.

    Certifications: Microsoft Certified Professional, Microsoft Certified Solutions Associate, Microsoft Certified Solutions Expert, Microsoft Certified Technician, Certified Ethical Hacker, and CompTIA A+

    Areas of expertise: Microsoft (Group Policy) and CompTIA

    CBT Nuggets is renowned for providing innovative training that's informative, meaningful, and engaging. We provide a variety of training, primarily in IT, project management, and office productivity topics. Our comprehensive library contains thousands of training videos ranging from Cisco networking to Microsoft Word. Whether you want to pass a certification exam, increase your skills, or simply learn new things, we've got you covered! All of our training is delivered through high-quality online streaming video. Subscribers can train 24 hours a day, seven days a week, from the convenience of a computer or mobile device. CBT Nuggets trainers are the rock stars of training, renowned for their expertise, industry-wide credibility, and engaging personalities. They enable CBT Nuggets to deliver accurate, up-to-date training, using a laid-back whiteboard presentation style. There are no scripts, EVER. Our trainers love to teach, and it shows! CEO and founder Dan Charbonneau was a Microsoft trainer when he began recording CBT Nuggets' very first training videos back in the 1990s. He wanted to help provide large organizations, small teams and individuals with comprehensive and budget-conscious training, and he realized it couldn't be done in a classroom. From the CBT Nuggets World Headquarters in Eugene, Oregon, Dan and his team promise each video will be informative, comprehensive, accurate, and fun to watch.
    • language english
    • Training sessions 165
    • duration 19:54:58
    • English subtitles has
    • Release Date 2024/06/25