-
Intermediate Project Management
$99.00In this course, you will focus on the last three stages of the project life cycle: planning, execution, and termination. This includes identifying tasks and resources; using scheduling techniques like the work breakdown structure, Gantt charts, and network diagrams; preparing a budget; executing a project; and controlling changes. -
Microsoft 365 Teams: Using Other Communication Tools
$99.00Use chat Make audio and video calls Use the Teams calendar to manage meetings Manage files -
Microsoft 365 Word: Online: Formatting Text and Paragraphs
$99.00In this course you will learn how to: Apply character formatting, Create lists, Control paragraph layout, and Apply styles to text. -
Public Speaking: Speaking Under Pressure
$139.99This course will take you through preparing an effective presentation. Topics include planning your speech, identifying your audience, connecting with the listener, developing key themes and sentences, structuring your ideas, and managing nervousness and body language. You’ll focus on short responses and learn ways to expand a basic presentation. -
Microsoft 365 Word: Part 3: Collaborating on Documents
$99.00Modify user information in a document Share a document Work with comments Compare document changes Review a document with tracked changes Merge document changes Coauthor documents -
Continuous Improvement with Lean
$99.00In this course, you will learn about developing continuous improvement strategies in the workplace using Lean methodology. The course focuses on the Identify – Plan – Execute – Review cycle, and wraps up with an in-depth case study to help you practice what you have learned. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.