-
Microsoft 365 Excel: Part 1: Modifying a Worksheet
$99.00Format text and cells Align cell contents Use Find & Select tools Use Spell Checking -
Microsoft 365 Word: Part 3: Securing a Document
$99.00Suppress information Set editing restrictions Add a digital signature to a document Restrict document access -
Growth Hacking
$99.00In this one-day course, you will learn how to: identify the growth hacking mindset, recognize the differences between growth hacking and marketing, identify the customer need your business can fill, create and implement product placement and services to fit the need, learn and practice techniques of growth hacking, review and practice growth marketing strategies, identify the essentials of conversion and optimization, and create your own growth hacking plan. -
Story Marketing for Small Businesses
$99.00This course covers the essential elements of a story marketing campaign, from a review of company message and brand, to the elements of good storytelling. The course leads participants through the steps of creating a marketing story — knowing your company, knowing and connecting with customers, and the story writing and editing process. This creates a clear and engaging path that will lead customers to your products and services and encourage them to respond to your call to action. -
Employee Dispute Resolution: Mediation through Peer Review
$139.99In this course, you will learn about the peer review process, which includes a statement being filed, gathering evidence, creating the peer review panel, conducting the peer review hearing, and making a decision. -
Business Succession Planning: Developing and Maintaining a Succession Plan
$139.99This course will teach you how to develop and maintain a succession plan with the SUCCESS model, which includes developing a system, identifying resources, creating risk assessments, developing action plans, implementing those plans, and evaluating the results. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.