- 
		
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data - 
		
Progressive Discipline
$99.00This course will ensure that all staff members understand the importance and use of progressive discipline. It starts by examining ways to minimizing disciplinary issues and after defining discipline, discipline policies and progressive discipline, it gives hands-on experience with verbal warnings, written warnings, performance improvement plans and termination, using thought exercises and scenarios. - 
		
Six Sigma: Entering the Dojo
$99.00Once you complete Six Sigma: Entering the Dojo your skills in this practical area of business improvement will be prepped and practiced enough to apply them in the real world. You are going to learn about the basics of Six Sigma and about various improvement tools. You will follow that up with a look at management tools for generating ideas. A look at continuous improvement is next on the agenda and the course concludes with a consideration of customer relationships. - 
		
Microsoft 365 Word: Part 3: Securing a Document
$99.00Suppress information Set editing restrictions Add a digital signature to a document Restrict document access - 
		
Microsoft 365 OneNote: Online: Finalizing a Notebook
$99.00In this course you will learn how to: use proofing tools, share and collaborate on notebooks, and work with notebook versions. - 
		
Microsoft 365 Excel: Part 3: Exporting and Sourcing Data
$99.00Export data Use data sources Use Microsoft Forms - 
		
NLP Tools for Real Life
$139.99This course will teach you about anchoring, establishing congruency, developing rapport, creating outcomes, interpreting and presenting information efficiently, and self-hypnosis. - 
		
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan. 




































