-
Transgender Employees: Creating an Inclusive Work Community
$99.00In this course, you are going to learn about the importance and elements of safe inclusive workspaces for transgendered persons – those identifying as one gender but born into the body of the opposing gender. You will consider terminology, elements, policies, and resources to build and sustain a safe, inclusive environment for transgendered employees and increase the comfort level and productivity off all in your organization. -
Introduction to HTML and CSS Coding: Extended Styling Techniques using HTML and CSS
$99.00In this course you will learn how to use grouping elements, change the dimensions of a div block, and use the CSS box model to format your webpage. -
Creative Thinking and Innovation
$99.00In this course, you will identify ways to develop your creative side and build a creative environment. You’ll also learn a basic problem-solving process, individual creative thinking tools (such as the RAP model, shoe swap technique, mind mapping, metaphors, and toys), and team-based creative thinking tools (such as brainstorming, brainwriting, rolestorming, the stepladder technique, and slip writing). -
Microsoft 365 Excel: Part 3: Exporting and Sourcing Data
$99.00Export data Use data sources Use Microsoft Forms -
Mastering The Interview
$139.99In this course, you will learn how to prepare for and participate in a job interview. We’ll share the types of questions to expect, as well as the questions that you should think about asking. You will also learn how to prepare for second interviews, testing, and shadowing, as well as how to follow up after an interview. -
Microsoft 365 Teams: Getting Started
$99.00Describe what Microsoft Teams is all about Use channels and post messages Get help in Teams -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































