-
Introduction to HTML and CSS Coding: Extended Styling Techniques using HTML and CSS
$99.00In this course you will learn how to use grouping elements, change the dimensions of a div block, and use the CSS box model to format your webpage. -
Microsoft 365 Excel: Part 2: Creating Advanced Formulas
$99.00Apply range names Use specialized functions -
GDPR Readiness: Getting the Message Out
$99.00In this one-day course, you will learn: about internal communication methods, about privacy training, and promoting a good privacy culture,about the elements of a good customer privacy policy, how to write and design a cookie banner disclaimer for your website, and how to design a privacy-compliant web form. -
Microsoft 365 Excel: Part 2: Analyzing Data with Logical and Lookup Functions
$99.00Use text functions Use logical functions Use lookup functions Use date functions Use financial functions -
Windows 10: May 2019 Update: Windows Settings and Storage
$99.00In this course you will learn how to use the updated Settings app, and use the updated Storage settings. -
Microsoft 365 OneNote: Online: Getting Started
$99.00In this course you will learn how to: get started with OneNote Online, set up a notebook, manage pages and sections, and print and view notebooks. -
Introduction to HTML and CSS Coding Part 2: Performance and Organization
$99.00In this course you will learn about strategy and structure, object-oriented CSS, scalable and modular architecture for CSS, and reusable code. -
Microsoft 365 Outlook: Online: Getting Started
$99.00In this session, you will learn: about key terms associated with Microsoft Outlook, how to log into Microsoft Office, launch Outlook Online, and use its interface, about notifications, and how to get help in Outlook Online. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.