-
Advanced Writing Skills
$139.99In this course, you will learn how to write specific kinds of documents, including letters, business cases, reports, and proposals. You will also review some fundamental writing rules, such as the four C’s of writing and paragraph construction. -
Microsoft 365 Excel: Part 2: Creating Advanced Formulas
$99.00Apply range names Use specialized functions -
The Minute Taker’s Workshop
$139.99You’ll begin this course by learning what a minute-taker does and what skills they should have. Then, you’ll learn about different styles of minutes, what to record, how to prepare minutes, and how to keep a minute book. -
Team Building: Developing High Performance Teams
$99.00After you complete this course, you will understand how to apply the TORI model, Tuckman and Jensen’s five stages of team development, and Glenn Parker’s 12 characteristics of effective teams to develop high-performance teams. You will also complete the Velsoft team player type assessment to help you identify how you behave in a team and how you can connect with others. -
Microsoft 365 Word: Online: Working with Images
$99.00In this course you will learn how to: Insert images. Resize images. and Adjust image appearance. -
The ABC’s Of Supervising Others:
$99.00This course will help you overcome many of the problems that you will encounter as a workplace leader. Topics include transitioning to a supervisory role, attitudes to cultivate, setting goals, personal productivity, communication skills, feedback techniques, conflict resolution, managing difficult conversations, and establishing credibility. -
Microsoft 365 Word: Part 3: Adding Reference Marks and Notes
$99.00Add captions to objects Insert cross-references Add bookmarks and hyperlinks Insert footnotes and endnotes Add citations Insert a bibliography -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.