-
Microsoft 365 Word: Part 3: Simplifying and Managing Long Documents
$99.00Add cover pages and blank pages to a document Insert an index Insert a table of contents Insert ancillary tables, such as tables of figures and authorities Manage document outlines Create master and subdocuments -
Microsoft 365: 2021 Feature Updates
$99.00By the end of this course, users should be comfortable using the new features of Word, Excel, PowerPoint, and Outlook that were released in 2021 for the desktop version of Microsoft 365. -
Microsoft 365 OneNote: Online: Working with Notes, Part One
$99.00In this course you will learn how to: use formatting tools, and add images, tables, and other elements to a notebook. -
Motivation Training: Motivating Your Workforce
$99.00To start this course, you will learn about some basic motivation theories. You will also learn about setting goals, identifying values, and ways to create a motivational climate. -
Hiring for Success: Behavioral Interviewing Techniques
$99.00This course will take you through the hiring process from start to finish, including cost analysis, position profiles, finding candidates, screening resumes, testing candidates, interviewing (including different types of questions), evaluating responses, and reference checks. You will also learn about some of the problems commonly encountered in the hiring process and how to overcome them. -
Building a Consulting Business
$99.00This course will guide you along your journey to starting your own consulting business. It will take a look at important components such as business plans and marketing plans while touching on networking and important documents you need to consider. -
Microsoft Sway: Working with Text and Images
$99.00In this course you will learn how to format text, and add media to a Sway project. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































