-
Microsoft 365 Word: Part 3: Managing Document Versions
$99.00Create a new document version using Microsoft Word and Microsoft SharePoint Server Compare document versions Merge document versions -
Intermediate Project Management
$99.00In this course, you will focus on the last three stages of the project life cycle: planning, execution, and termination. This includes identifying tasks and resources; using scheduling techniques like the work breakdown structure, Gantt charts, and network diagrams; preparing a budget; executing a project; and controlling changes. -
The Minute Taker’s Workshop
$139.99You’ll begin this course by learning what a minute-taker does and what skills they should have. Then, you’ll learn about different styles of minutes, what to record, how to prepare minutes, and how to keep a minute book. -
Microsoft Teams: Using Other Communication Tools
$99.00In this course you will learn how to use chat, and manage meetings and files. -
Budgets and Managing Money
$99.00To start this course, you will review the fundamentals of finance (including basic terms, generally accepted accounting principles, and financial roles in an organization). Then, you will learn about different types of budgets and a six-step budgeting process. You will also learn how to monitor budgets, perform basic ratio analysis, and compare investment opportunities. -
Building a Brand on Social Media
$99.00In this course you will look at various social media platforms and how they can be melded into your business to promote your brand. Along the way you will learn how to decide who your audience is, how to handle negative feedback as well as how to develop a complete social media plan. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.