-
Microsoft Office 365: 2018 Feature Updates
$99.00By the end of this course, users should be comfortable using the new features released in 2018 for the desktop version of Microsoft Office 365, including features of Microsoft Word, Excel, PowerPoint, Outlook, Access, and Visio. -
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Story Marketing for Small Businesses
$99.00This course covers the essential elements of a story marketing campaign, from a review of company message and brand, to the elements of good storytelling. The course leads participants through the steps of creating a marketing story — knowing your company, knowing and connecting with customers, and the story writing and editing process. This creates a clear and engaging path that will lead customers to your products and services and encourage them to respond to your call to action. -
Working Smarter: Using Technology to Your Advantage
$139.99In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Giving Effective Feedback – Free
$99.00In this course, you will learn about the essential elements of feedback, important communication techniques, and a framework for informal and formal feedback. You’ll also learn some tips for receiving feedback. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.