-
Online Tools for Small Business
$99.00At the end of this course, you will know about popular free online tools for small business owners, understand basic functions of Google Docs, Canva, Trello, Survey Monkey, and MailChimp, be able to select tools that meet or match your business needs, and know how to use these tools in your business. -
Microsoft 365 Outlook: Online: Using the People Workspace
$99.00In this course you will learn how to: get started with the People workspace, work with contacts, and use contact lists. -
Microsoft 365 Outlook Part 1: Composing Messages
$99.00Create an email message, check spelling and grammar, format message content, attach files and items to an email message, enhance an email message, and manage automatic message content. -
Continuous Improvement with Lean
$99.00In this course, you will learn about developing continuous improvement strategies in the workplace using Lean methodology. The course focuses on the Identify – Plan – Execute – Review cycle, and wraps up with an in-depth case study to help you practice what you have learned. -
Microsoft 365 Outlook: Online: Getting Started
$99.00In this session, you will learn: about key terms associated with Microsoft Outlook, how to log into Microsoft Office, launch Outlook Online, and use its interface, about notifications, and how to get help in Outlook Online. -
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































