-
Introduction to Microsoft Power BI: Getting Started
$99.00In this course you will learn how to describe the components of Power BI, work with Power BI files, connect to data sources with the Power BI desktop client, create a report and visualizations, and work with visualizations. -
Microsoft 365 Teams: Communicating in Channels
$99.00Manage messages Do more with messages Manage files in a channel Use the wiki -
Microsoft 365 Outlook Part 1: Getting Started With Outlook 365
$99.00Navigate the Outlook interface, perform basic email functions, and use Outlook help. -
Microsoft 365 Teams: Customizing Your Teams Experience
$99.00Manage your Teams profile Manage teams Add bots and apps to Teams -
10-Minute Presentations
$99.00At the end of this workshop, you will be able to know and use essentials of a good presentation, choose platforms that enhance your message and reach, set goals and timelines for your presentation, create engaging narrative from outline through final draft, edit and polish your presentation, offer and receive peer review and, develop best practices for future presentations. -
Introduction to HTML and CSS Coding: Getting Started with CSS
$99.00In this course you will learn how to add the "style" tag to the HTML code, add colors to elements with CSS, and use identifiers to select elements to style. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Microsoft 365 Outlook Part 1: Managing Your Messages
$99.00Manage messages using tags, flags, and other commands, and organize messages using folders. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































