-
Workplace Ergonomics: Injury Prevention Through Ergonomics
$139.99In this course, you will learn how to identify, assess, and resolve ergonomic issues. You will also learn about basic ergonomic principles for sitting, standing, lifting, transporting items, and using tools. Ergonomic environments and workstations will also be covered. -
Kickstarting Your Business with Crowdsourcing
$99.00This course will show you how to leverage all types of crowdsourcing (including microwork, macrowork, crowdvoting, crowdcontests, crowdwisdom, and crowdfunding) to kickstart your business’ growth. -
Introduction to HTML and CSS Coding Part 2: Complex Selectors
$99.00In this course, you will learn how to use commonly used selectors, child selectors, attribute selectors, and pseudo-selectors. -
Microsoft 365 Excel: Part 3: Data Analysis and Presentation
$99.00Use the Quick Analysis tool Add sparklines Perform What-If analysis Load and use the Analysis ToolPak -
Microsoft 365 Outlook: Online: Using the Microsoft To Do Workspace
$99.00In this course you will learn how to: get started with the Microsoft To Do workspace, work with tasks, and manage tasks. -
Marketing with Social Media
$139.99In this course, you will learn how to develop a social media marketing plan as a part of an overall marketing strategy, determine who should be on your team, and choose how you will measure what is taking place. In addition, you will learn about blogging, explore some of the major social media sites (such as LinkedIn, Twitter, and Facebook), and look at how specialty sites and social media management tools can take your social media marketing to the next level. -
Microsoft 365 Excel: Part 2: Creating Advanced Formulas
$99.00Apply range names Use specialized functions -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































