-
Microsoft 365 Word: Part 3: Securing a Document
$99.00Suppress information Set editing restrictions Add a digital signature to a document Restrict document access -
Microsoft 365 Excel: Online: Working with Data
$99.00In this course you will learn how to: use formulas and functions, work with data, rows, and columns, and sort and filter data. -
Microsoft 365 Excel: Part 2: Creating Advanced Formulas
$99.00Apply range names Use specialized functions -
Effective Planning and Scheduling
$99.00This course will teach you how to use a variety of planning and scheduling tools, including the work breakdown structure, network diagrams, program evaluation and review technique (PERT), and Gantt charts. You will also learn how to properly estimate time, schedule resources, identify task dependencies, manage risks, communicate your schedule, and keep the schedule updated. -
Microsoft 365 Outlook: Online: Using the People Workspace
$99.00In this course you will learn how to: get started with the People workspace, work with contacts, and use contact lists. -
Microsoft 365 Excel: Part 3: Working with Multiple Workbooks
$99.00Arrange windows Link to data in multiple workbooks Consolidate data -
Skills for the Administrative Assistant
$139.99In this course, you’ll learn about the elements of a professional attitude, including dressing appropriately, developing a positive outlook, being assertive, and communicating well. You’ll also learn some fundamental skills for administrative assistants, such as writing letters, managing your time, saying “no,” working with others, and dealing with stress. All of these tools will help you achieve your goals and help the people that you support achieve their goals, too. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































