-
Introduction to Neuro Linguistic Programming
$139.99This introductory course will teach the basics of neuro linguistic programming (NLP). You’ll learn about key terms, the NLP presuppositions, the NLP senses, eye cues, enriched language, clean questions, and hypnotic language. -
Introduction to HTML and CSS Coding Part 2: Performance and Organization
$99.00In this course you will learn about strategy and structure, object-oriented CSS, scalable and modular architecture for CSS, and reusable code. -
The ABC’s Of Supervising Others:
$99.00This course will help you overcome many of the problems that you will encounter as a workplace leader. Topics include transitioning to a supervisory role, attitudes to cultivate, setting goals, personal productivity, communication skills, feedback techniques, conflict resolution, managing difficult conversations, and establishing credibility. -
Microsoft 365 Excel: Online: Finalizing Workbooks
$99.00In this course you will learn how to: use comments, manage worksheets, and change view options. -
Microsoft 365 Outlook: Online: Organizing Email
$99.00In this course you will learn how to: manage folders, use categories, use viewing tools, and clean up messages. -
Employee Dispute Resolution: Mediation through Peer Review
$139.99In this course, you will learn about the peer review process, which includes a statement being filed, gathering evidence, creating the peer review panel, conducting the peer review hearing, and making a decision. -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.