-
Microsoft 365 PowerPoint Online: Working with Images and Shapes
$99.00In this course you will learn how to: Insert graphics, Modify and format objects, and Adjust image appearance -
Introduction to E-Mail Marketing
$99.00In this course, you will receive an in-depth introduction to e-mail marketing. Once you have completed this course, you will be ready to plan, create, and deliver e-mail marketing campaigns that build relationships with customers and get results. -
Entrepreneurship 101
$99.00In this course, you’ll learn the basics of entrepreneurship. You will learn how to find and evaluate business ideas, flesh out those ideas by developing value propositions and financial projections, consider your ownership options, prepare the appropriate documents (including a business plan, pitch deck, and white papers), and gather funding for your business. You’ll also learn the steps of developing, testing, marketing, and launching a product or service. To wrap things up, you’ll learn how to grow your business and become an entrepreneurial leader. -
Writing a Business Plan
$139.99In this course, you will learn the essential steps for creating a business plan, including creating a first draft; identifying the audience; gathering information; researching; describing product plans; and marketing, sales, and accounting terms. -
Microsoft 365 Excel: Part 2: Organizing Worksheet Data with Tables
$99.00Create and format tables Modify tables Use table references -
Microsoft 365 Outlook: Online: Using the Calendar Workspace
$99.00In this course you will learn how to: get started with the Calendar workspace, work with events, use the Event window, and use shared calendars. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.