-
Microsoft 365 Excel: Part 3: Auditing and Error Checking
$99.00Tracing cells Error checking Evaluating formulas and using the Watch Window Data List Outlines -
Mastering Adult Learning Methods
$99.00This course will ensure that you have the skills to compare and contrast the teaching of children (pedagogy) and adult learning (andragogy), to apply best practices in adult education within your own classroom, to explain the importance of reflection in adult learning, to develop and use self-reflection and group reflection within classroom activities to enhance learning, to explain the importance of experiential, self-directed, project based, and action learning in adult education and to develop and use experiential learning, self-directed, project-based, and action learning classroom activities to enhance learning. -
Conversational Leadership
$99.00In this course, you will learn about the fundamental elements of meaningful conversations, the four-I model of organizational conversation, the conversational leadership framework, and the World Café model. All of these tools will help you become a conversational leader and build stronger teams in your workplace. -
Microsoft 365 Excel: Online: Organizing Worksheet Data with Tables and Charts
$99.00In this course you will learn how to create and modify tables and charts. -
Getting Started with Microsoft 365: File Storage and Collaboration
$99.00Store files and collaborate with OneDrive for Business Manage an organization’s activity with Delve -
Microsoft Sway: Graphics and Design
$99.00In this course you will learn how to work with images, customize image display, and set design options. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































