-
Influence and Persuasion
$99.00In this course, you will learn how to speak persuasively, communicate with confidence, build rapport, develop a strong presentation, and leverage storytelling. You’ll also receive an introduction to basic neuro linguistic programming techniques. -
Microsoft Skype for Business 2016: Customizing Skype for Business
$99.00In this lesson you will learn how to customize contact groups, use recording features, and customize Skype for Business options. -
Emotional Intelligence
$99.00This course will introduce you to the history of emotional intelligence and what it’s all about. You’ll explore the most popular theories, including the EI blueprint, Martin Seligman’s ABC’s of optimism, the VALUE and SOLER techniques, Ekman’s seven basic emotions, and Plutchik’s wheel. You’ll also explore your personal values and vision statement to help guide you in your emotional intelligence development. -
Windows 10: May 2019 Update: Getting Started
$99.00In this course you will learn about the Windows 10 May 2019 Update and what it includes. You will also learn how to update Windows 10 to the May 2019 Update. and sign into Windows 10. -
Microsoft 365 SharePoint: User’s Guide
$99.00In this course you will learn how to: Get started with SharePoint, Work with files, and Use advanced features. -
Microsoft 365 Teams: Communicating in Channels
$99.00Manage messages Do more with messages Manage files in a channel Use the wiki -
Microsoft 365 OneNote: Online: Working with Notes, Part One
$99.00In this course you will learn how to: use formatting tools, and add images, tables, and other elements to a notebook. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.