-
Microsoft 365 Word: Online: Working with Images
$99.00In this course you will learn how to: Insert images. Resize images. and Adjust image appearance. -
Microsoft Skype for Business 2016: Getting Started
$99.00In this course you will learn how to get started with Skype for Business 2016, communicate with contacts, and update your status information. -
Appreciative Inquiry
$99.00In this course you will learn about the appreciative inquiry process. To begin, you’ll explore its fundamental principles and the 4-D model. You’ll also get a hands-on look at the appreciative inquiry interview guide and start considering how this powerful tool could make a difference in your organization. -
Microsoft Teams: Using Other Communication Tools
$99.00In this course you will learn how to use chat, and manage meetings and files. -
Microsoft Office 365: 2018 Feature Updates
$99.00By the end of this course, users should be comfortable using the new features released in 2018 for the desktop version of Microsoft Office 365, including features of Microsoft Word, Excel, PowerPoint, Outlook, Access, and Visio. -
Honing and Delivering Your Message
$99.00Learn how to clarify your message and how to present it, successfully communicate your message, and ensure your listeners hear what you want to get across to them with the Honing and Delivering Your Message course. -
Building a Consulting Business
$99.00This course will guide you along your journey to starting your own consulting business. It will take a look at important components such as business plans and marketing plans while touching on networking and important documents you need to consider. -
Getting Started with Microsoft 365: Managing Users
$99.00Get started as an administrator Manage users, groups, and resources in Microsoft 365 -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































