-
Building Your Self Esteem and Assertiveness Skills
$139.99In this course, you will explore what self-esteem is and where low self-esteem comes from. You will also learn ways to build your self-esteem, get what you want, and make others feel better about themselves. -
Microsoft 365 PowerPoint Online: Getting Started
$99.00In this course you will learn how to: Get started with PowerPoint Online, Create, edit, and view presentations, and Get help in PowerPoint Online. -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Microsoft 365 Outlook Part 1: Composing Messages
$99.00Create an email message, check spelling and grammar, format message content, attach files and items to an email message, enhance an email message, and manage automatic message content. -
The Practical Trainer
$139.99In this course, you will learn what makes a successful trainer and a successful training program. You will also learn about adult learning principles, the learning process, Kolb’s experiential learning cycle, and learning styles. You’ll even complete an assessment to help you identify your training preferences. Then, you will learn how to apply the learning cycle to assess needs, develop a program outline, choose training methods, design learning sequences, add some fun and games, and launch the program. You will also learn tips for delivering your program and managing difficult participants. -
Getting Started with Microsoft 365: Managing Security
$99.00Manage domains Monitor Microsoft 365 security and compliance -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.