-
Microsoft 365 Excel: Part 2: Analyzing Data with PivotTables, Slicers, and PivotCharts
$99.00Create a PivotTable Filter data using slicers Analyze data using PivotCharts -
Introduction to Microsoft Power BI: Working with Reports and Visualizations
$99.00In this course you will learn how to manage report pages, change report view options, work with visualizations and their data, and add static objects to a report. -
Team Building: Developing High Performance Teams
$99.00After you complete this course, you will understand how to apply the TORI model, Tuckman and Jensen’s five stages of team development, and Glenn Parker’s 12 characteristics of effective teams to develop high-performance teams. You will also complete the Velsoft team player type assessment to help you identify how you behave in a team and how you can connect with others. -
Project Management Fundamentals
$99.00In this course, you will learn what a project is and what a project manager does. You will also learn about the life cycle of a project. In particular, you will focus on the conceptual phase of project management, where you identify, prioritize, and scope a project idea. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Microsoft 365 Excel: Part 1: Modifying a Worksheet
$99.00Format text and cells Align cell contents Use Find & Select tools Use Spell Checking -
Introduction to HTML and CSS Coding Part 2: Complex Selectors
$99.00In this course, you will learn how to use commonly used selectors, child selectors, attribute selectors, and pseudo-selectors. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.