-
Introduction to HTML and CSS Coding Part 2: Complex Selectors
$99.00In this course, you will learn how to use commonly used selectors, child selectors, attribute selectors, and pseudo-selectors. -
Microsoft Office 365: 2018 Feature Updates
$99.00By the end of this course, users should be comfortable using the new features released in 2018 for the desktop version of Microsoft Office 365, including features of Microsoft Word, Excel, PowerPoint, Outlook, Access, and Visio. -
Negotiating for Results
$139.99In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Training with Visual Storytelling
$99.00In this course, you will learn how to use storytelling to engage the hearts and minds of your audience. We’ll cover the essential elements of a successful story as well as a variety of storyboarding and graphic design tools. After you complete this course, you’ll be ready to create engaging, compelling training sessions that inspire your students. -
Creating Winning Webinars: Getting Your Message Out
$99.00This course is going to teach you to understand what webinars are and why they are important. You will also learn best practices for implementation and development of webinars. You are going to learn the appropriate structure and platform for your webinar and also how to outline a webinar. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.