-
Microsoft 365 PowerPoint Online: Finishing your Presentation
$99.00In this lesson you will learn how to: Apply animations and transitions, Customize design options, Work with comments, and Co-author a presentation. -
Collaboration
$99.00After completion of this course, you should understand the definition of collaboration, what it takes to work collaboratively with your colleagues and the advantages of collaboration. Obstacles to collaboration will be explored, and how to develop strategies to improve a collaborative work environment. As well, you will know the six steps to make collaboration work, and the difference between collaboration, cooperation and teamwork. -
Creating a Google AdWords Campaign
$139.99In this one-day course, you will learn how Google AdWords work, what pay per click means, the importance of correctly setting an AdWord budget, how to select keywords and set up ad groups, how to design a compelling ad, and how to make adjustments to increase success. -
CRM: An Introduction to Customer Relationship Management
$99.00This course will teach you how to make a decision about the need for CRM, the benefits of CRM, and how to coordinate the base requirements for a CRM undertaking. -
Microsoft 365 Excel: Part 3: Auditing and Error Checking
$99.00Tracing cells Error checking Evaluating formulas and using the Watch Window Data List Outlines -
Negotiating for Results
$139.99In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































