-
Introduction to Neuro Linguistic Programming
$139.99This introductory course will teach the basics of neuro linguistic programming (NLP). You’ll learn about key terms, the NLP presuppositions, the NLP senses, eye cues, enriched language, clean questions, and hypnotic language. -
Microsoft 365 Word: Online: Working with Images
$99.00In this course you will learn how to: Insert images. Resize images. and Adjust image appearance. -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Employee Dispute Resolution: Mediation through Peer Review
$139.99In this course, you will learn about the peer review process, which includes a statement being filed, gathering evidence, creating the peer review panel, conducting the peer review hearing, and making a decision. -
Fostering Innovation
$99.00At the end of this course, you will be able to understand what fostering innovation means , learn what an innovative workplace looks like, determine how you can help create an innovative workplace environment, understand your role in helping to foster innovation, know what happens in the workplace when you help foster innovation, and describe ways that innovation can help your company. -
NLP Tools for Real Life
$139.99This course will teach you about anchoring, establishing congruency, developing rapport, creating outcomes, interpreting and presenting information efficiently, and self-hypnosis. -
Introduction to HTML and CSS Coding Part 2: Responsive Web Design
$99.00In this course, you will learn how to use flexible layouts, media queries, and flexible media. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.