-
Microsoft Skype for Business 2016: Getting Started
$99.00In this course you will learn how to get started with Skype for Business 2016, communicate with contacts, and update your status information. -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Microsoft 365 Teams: Using Other Communication Tools
$99.00Use chat Make audio and video calls Use the Teams calendar to manage meetings Manage files -
Microsoft 365 PowerPoint Online: Working With Tables
$99.00In this course you will learn how to: Create, edit, and format tables. -
GDPR Readiness: Getting the Message Out
$99.00In this one-day course, you will learn: about internal communication methods, about privacy training, and promoting a good privacy culture,about the elements of a good customer privacy policy, how to write and design a cookie banner disclaimer for your website, and how to design a privacy-compliant web form. -
Survival Skills for the New Trainer
$139.99In this course, you will learn the basic skills that every trainer must have. This includes dressing appropriately, being assertive, being genuine, communicating well, connecting with people, handling difficult participants, and a desire to learn. At the end of the course, you’ll review a list of do’s and don’ts and consider your next steps. -
Conflict Resolution: Getting Along In The Workplace
$99.00In this course, you will learn what conflict is all about. You will also learn about different types of conflict, stages of conflict, helping others through conflict, and creating win/win solutions. As a bonus, you will also learn supporting skills, such as communication, active listening, and body language. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































