-
Microsoft 365 Excel: Part 1: Modifying a Worksheet
$99.00Format text and cells Align cell contents Use Find & Select tools Use Spell Checking -
The ABC’s Of Supervising Others:
$99.00This course will help you overcome many of the problems that you will encounter as a workplace leader. Topics include transitioning to a supervisory role, attitudes to cultivate, setting goals, personal productivity, communication skills, feedback techniques, conflict resolution, managing difficult conversations, and establishing credibility. -
Microsoft 365 Outlook: Online: Working with Email Messages
$99.00In this course you will learn how to: create and send email messages, respond to email messages in different ways, add items to a message, and manage messages. -
Microsoft 365 PowerPoint Online: Working with Images and Shapes
$99.00In this course you will learn how to: Insert graphics, Modify and format objects, and Adjust image appearance -
Purchasing and Procurement Basics
$99.00In this course, you will learn the basics of purchasing and procurement. You’ll receive an introduction to the supply chain, the purchasing cycle, and basic purchasing tools. You’ll also learn about the competitive bidding process, how to manage supplier performance, risk management techniques, and ways to build relationships. -
Employee Accountability
$139.99You will begin this course by exploring what accountability is all about and some recent events that have caused people to look at accountability more closely. Then, you’ll learn ways to build accountability and ownership in your organization and make yourself more accountable. Supporting skills, like goal setting, feedback, and delegation, are also covered. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































