-
Telemarketing: Using the Telephone as a Sales Tool
$99.00In this course, you will learn how to communicate effectively over the telephone, develop your personal telemarketing script, and close a sale. You’ll also learn how telemarketing can add to your sales strategy. -
Microsoft 365 Outlook: Online: Organizing Email
$99.00In this course you will learn how to: manage folders, use categories, use viewing tools, and clean up messages. -
Training with Visual Storytelling
$99.00In this course, you will learn how to use storytelling to engage the hearts and minds of your audience. We’ll cover the essential elements of a successful story as well as a variety of storyboarding and graphic design tools. After you complete this course, you’ll be ready to create engaging, compelling training sessions that inspire your students. -
Growth Hacking
$99.00In this one-day course, you will learn how to: identify the growth hacking mindset, recognize the differences between growth hacking and marketing, identify the customer need your business can fill, create and implement product placement and services to fit the need, learn and practice techniques of growth hacking, review and practice growth marketing strategies, identify the essentials of conversion and optimization, and create your own growth hacking plan. -
Microsoft 365 Word: Part 3: Securing a Document
$99.00Suppress information Set editing restrictions Add a digital signature to a document Restrict document access -
Microsoft Sway: Getting Started with Sway
$99.00In this course, you will learn how to launch Sway, create a new Sway project, create and manage cards, and manage Sway projects. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































