-
Microsoft 365 Word: Part 3: Adding Reference Marks and Notes
$99.00Add captions to objects Insert cross-references Add bookmarks and hyperlinks Insert footnotes and endnotes Add citations Insert a bibliography -
Microsoft 365 Outlook Part 1: Customizing the Outlook Environment
$99.00Customize the Outlook interface, and create and manage Quick Steps. -
Workplace Harassment: What It Is and What to Do About It
$99.00In this course, you will learn about different types of harassment. You will also learn prevention strategies (such as harassment policies and handling issues promptly), what to do if you are harassed, what to do if you are accused of harassment, and how to handle harassment as a manager. Then, you will learn a basic complaint resolution process (including how to handle false complaints), when mediation might be an option, and ways to help the workplace return to normal. -
Building Better Teams
$139.99In this course, you will learn what forms teams can take. You’ll also evaluate your team player type, learn ways to build an effective team, and identify things that you can do to become a good team player. -
Microsoft 365 Outlook: Online: Getting Started
$99.00In this session, you will learn: about key terms associated with Microsoft Outlook, how to log into Microsoft Office, launch Outlook Online, and use its interface, about notifications, and how to get help in Outlook Online. -
Business Process Management
$99.00To begin this course, you will learn about business process management and three related skill areas: business analysis, enterprise content management, and business process re-engineering. Then, you will work through the five stages of the business process life cycle: vision, design, modeling, execution, monitoring, and optimization. Tools such as automation, business rules, workflow engines, what-if analysis, process mining, business activity monitoring, the balanced scorecard, Lean, and Six Sigma are also covered. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan. -
Effective Planning and Scheduling
$99.00This course will teach you how to use a variety of planning and scheduling tools, including the work breakdown structure, network diagrams, program evaluation and review technique (PERT), and Gantt charts. You will also learn how to properly estimate time, schedule resources, identify task dependencies, manage risks, communicate your schedule, and keep the schedule updated. -
Introduction to HTML and CSS Coding Part 2: Complex Selectors
$99.00In this course, you will learn how to use commonly used selectors, child selectors, attribute selectors, and pseudo-selectors. -
Tough Topics: Talking to Employees about Personal Hygiene
$99.00This course has two major themes. First, we’ll give you a customizable framework for having tough conversations. Then, we’ll look at some common tough conversations that come up, including body odor, flatulence, poor clothing and hair decisions, and bad breath. -
GDPR Readiness: Creating a Data Privacy Plan
$99.00After completion of this course, you should be able to explain what a data privacy plan will include, know the important terminology and legislation regarding data privacy, map the flow of data in an organization visually, understand and write an information request procedure, develop an internal data handling procedure, understand and write a data security policy, understand and write a personal data protection policy, adapt your current client privacy policy, develop a data breach procedure, decide on training solutions for data privacy, know the other necessary pieces of the data privacy plan and help your organization write, implement, and review a data privacy plan.