-
Microsoft 365 Excel: Part 2: Organizing Worksheet Data with Tables
$99.00Create and format tables Modify tables Use table references -
Being a Team Player
$99.00Teamwork is essential in any organization, and strongly influences whether a venture succeeds or fails. Participants will learn what characteristics are common to team players, how to demonstrate to others that you are a good team player, types of teams and which ones are vital to every workplace, reasons teams fail, and strategies to ensure success. Other courses that may be of interest are Creating a Positive Work Environment, Making Your Business Better, Problem Solving and Decision Making, Team Building- Developing High Performance Teams, and Communication Strategies. -
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Self-Leadership
$99.00In this course, you will explore the four pillars of self-leadership: knowing who you are, knowing what you do, knowing what you need to learn, and using what you know. -
Microsoft 365 Teams: Communicating in Channels
$99.00Manage messages Do more with messages Manage files in a channel Use the wiki -
Microsoft 365 Word: Part 3: Simplifying and Managing Long Documents
$99.00Add cover pages and blank pages to a document Insert an index Insert a table of contents Insert ancillary tables, such as tables of figures and authorities Manage document outlines Create master and subdocuments -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.