-
Microsoft Sway: Working with a Sway Project
$99.00In this course you will learn how to edit Sway projects, share a Sway project, and set Sway project options. -
Microsoft Sway: Graphics and Design
$99.00In this course you will learn how to work with images, customize image display, and set design options. -
Microsoft 365 Outlook Part 1: Getting Started With Outlook 365
$99.00Navigate the Outlook interface, perform basic email functions, and use Outlook help. -
Orientation Handbook: Getting Employees Off to a Good Start
$139.99In this course, you will learn why orientation is so important. You will learn about the four components of employee commitment as well as the commitment curve. You will also learn how to develop successful orientation and training programs. -
Entrepreneurship 101
$99.00In this course, you’ll learn the basics of entrepreneurship. You will learn how to find and evaluate business ideas, flesh out those ideas by developing value propositions and financial projections, consider your ownership options, prepare the appropriate documents (including a business plan, pitch deck, and white papers), and gather funding for your business. You’ll also learn the steps of developing, testing, marketing, and launching a product or service. To wrap things up, you’ll learn how to grow your business and become an entrepreneurial leader. -
Appreciative Inquiry
$99.00In this course you will learn about the appreciative inquiry process. To begin, you’ll explore its fundamental principles and the 4-D model. You’ll also get a hands-on look at the appreciative inquiry interview guide and start considering how this powerful tool could make a difference in your organization. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































