-
Microsoft 365 Excel: Online: Finalizing Workbooks
$99.00In this course you will learn how to: use comments, manage worksheets, and change view options. -
Workplace Violence: How to Manage Anger and Violence in the Workplace
$99.00In this course, you will learn a nine-stage plan to help organizations prevent violence. You will also learn how to respond to violent incidents, manage anger, and implement design and hiring practices that will keep employees safe. -
The Minute Taker’s Workshop
$139.99You’ll begin this course by learning what a minute-taker does and what skills they should have. Then, you’ll learn about different styles of minutes, what to record, how to prepare minutes, and how to keep a minute book. -
Microsoft 365 Word: Online: Inserting Objects
$99.00In this course you will learn how to: Add headers and footers to a document, Insert footnotes and endnotes, and Insert, modify, and format tables. -
The Practical Trainer
$139.99In this course, you will learn what makes a successful trainer and a successful training program. You will also learn about adult learning principles, the learning process, Kolb’s experiential learning cycle, and learning styles. You’ll even complete an assessment to help you identify your training preferences. Then, you will learn how to apply the learning cycle to assess needs, develop a program outline, choose training methods, design learning sequences, add some fun and games, and launch the program. You will also learn tips for delivering your program and managing difficult participants. -
Microsoft 365 Excel: Part 1: Modifying a Worksheet
$99.00Format text and cells Align cell contents Use Find & Select tools Use Spell Checking -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.