-
Microsoft 365 Word: Online: Getting Started
$99.00In this course you will learn how to: Get started with Word Online, Manage documents, Work with text, Find and replace text, Change view options, and Get help in Word Online. -
Microsoft 365 Outlook Part 1: Reading and Responding to Messages
$99.00Customize reading options, work with attachments, and manage your message responses -
Working Smarter: Using Technology to Your Advantage
$139.99In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Business Ethics for the Office
$139.99In this course, you will learn what the terms ethics, morals, and values mean. Then, you will learn about several different ethical frameworks, including Kohlberg’s six stages, philosophical approaches, personal values, and codes of ethics. You will also learn how to avoid ethical dilemmas, make ethical decisions, handle common ethical dilemmas, and recover from mistakes. -
Negotiating for Results
$139.99In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Microsoft 365 Outlook: Online: Organizing Email
$99.00In this course you will learn how to: manage folders, use categories, use viewing tools, and clean up messages. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.