-
Creating Winning Proposals
$99.00In this course, you will learn how to locate potential funders and how to match funders’ interests with organizational needs. Along the way you will also learn the basic elements of proposal writing for not-for-profit organizations and learn to understand the process for successful proposal writing and how to build effective relationships with funders. -
Microsoft 365 Outlook Part 1: Reading and Responding to Messages
$99.00Customize reading options, work with attachments, and manage your message responses -
Managing Difficult Conversations
$139.99This course will give you an eight-step process for a difficult conversation, as well as some things to consider when deciding to have the conversation (such as your desired outcome, the time and place, and how to stay safe). You’ll also learn how to speak persuasively, ask good questions, and listen actively. -
Fundamentals of Writing
$99.00Specific learning objectives include: how to write clearly, concisely, completely, and correctly; how to make sure words agree; how to recognize and use active voice; how to write proper sentences; how to use practical and inclusive language; how to use different punctuation marks; and, how to revise and proofread. -
Microsoft 365 PowerPoint Online: Getting Started
$99.00In this course you will learn how to: Get started with PowerPoint Online, Create, edit, and view presentations, and Get help in PowerPoint Online. -
CRM: An Introduction to Customer Relationship Management
$99.00This course will teach you how to make a decision about the need for CRM, the benefits of CRM, and how to coordinate the base requirements for a CRM undertaking. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.