-
Introduction to HTML and CSS Coding: Getting Started with HTML
$99.00In this course you will learn how to properly type HTML code, add basic elements, including headings, paragraphs, and breaks, and create a bulleted or numbered list. -
Conflict Resolution: Getting Along In The Workplace
$99.00In this course, you will learn what conflict is all about. You will also learn about different types of conflict, stages of conflict, helping others through conflict, and creating win/win solutions. As a bonus, you will also learn supporting skills, such as communication, active listening, and body language. -
Microsoft 365 Excel: Online: Using Pivot-Tables
$99.00In this course you will learn how to: insert PivotTables, work with PivotTable data, and sort and filter PivotTable data. -
Microsoft 365 Excel: Part 1: Getting Started
$99.00Identify the basic components of Excel Create a basic worksheet Get help in Excel 365 -
Microsoft Teams: Getting Started
$99.00In this course you will learn how to, describe what Microsoft Teams is all about, use channels and post messages, and get help in Teams. -
Microsoft 365 Word: Part 3: Collaborating on Documents
$99.00Modify user information in a document Share a document Work with comments Compare document changes Review a document with tracked changes Merge document changes Coauthor documents -
Problem Solving and Decision Making
$99.00In this course, you will learn a three-phase problem solving process that you can apply to any situation. You will also learn techniques for creative thinking, how to make good group decisions, and ways to follow up on and evaluate decisions. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.