-
Microsoft 365 Excel: Online: Working with Data
$99.00In this course you will learn how to: use formulas and functions, work with data, rows, and columns, and sort and filter data. -
Microsoft 365 Outlook Part 1: Getting Started With Outlook 365
$99.00Navigate the Outlook interface, perform basic email functions, and use Outlook help. -
Microsoft 365 OneNote: Online: Getting Started
$99.00In this course you will learn how to: get started with OneNote Online, set up a notebook, manage pages and sections, and print and view notebooks. -
Microsoft 365 Excel: Part 2: Organizing Worksheet Data with Tables
$99.00Create and format tables Modify tables Use table references -
Emotional Intelligence
$99.00This course will introduce you to the history of emotional intelligence and what it’s all about. You’ll explore the most popular theories, including the EI blueprint, Martin Seligman’s ABC’s of optimism, the VALUE and SOLER techniques, Ekman’s seven basic emotions, and Plutchik’s wheel. You’ll also explore your personal values and vision statement to help guide you in your emotional intelligence development. -
Giving Effective Feedback – Free
$99.00In this course, you will learn about the essential elements of feedback, important communication techniques, and a framework for informal and formal feedback. You’ll also learn some tips for receiving feedback. -
Microsoft 365 PowerPoint Online: Developing a PowerPoint Presentation
$99.00In this course you will learn how to: Build a presentation, Edit text and objects, and Format text and paragraphs. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.