-
Microsoft 365 PowerPoint Online: Finishing your Presentation
$99.00In this lesson you will learn how to: Apply animations and transitions, Customize design options, Work with comments, and Co-author a presentation. -
Microsoft 365 Word: Online: Working with Images
$99.00In this course you will learn how to: Insert images. Resize images. and Adjust image appearance. -
From Boss to Leader
$99.00After completing this course, participants will know the characteristics of bad bosses and good leaders, understand how those who hold management positions can develop into good leaders, know the elements of leading by example, understand the importance of good communication and effective feedback, and know how to use emotional intelligence. -
Intermediate Project Management
$99.00In this course, you will focus on the last three stages of the project life cycle: planning, execution, and termination. This includes identifying tasks and resources; using scheduling techniques like the work breakdown structure, Gantt charts, and network diagrams; preparing a budget; executing a project; and controlling changes. -
Microsoft 365 SharePoint: Configuring Site Settings
$99.00In this course you will learn how to: Configure site search options, Change site administration and navigation settings, and Configure site permissions. -
Microsoft 365 PowerPoint Online: Working with Images and Shapes
$99.00In this course you will learn how to: Insert graphics, Modify and format objects, and Adjust image appearance -
Microsoft Teams: Communicating in Channels
$99.00In this course you will learn how to manage messages, do more with messages, manage files in a channel, and use the wiki. -
Microsoft 365 Excel: Part 3: Data Analysis and Presentation
$99.00Use the Quick Analysis tool Add sparklines Perform What-If analysis Load and use the Analysis ToolPak -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































