-
Six Sigma: Entering the Dojo
$99.00Once you complete Six Sigma: Entering the Dojo your skills in this practical area of business improvement will be prepped and practiced enough to apply them in the real world. You are going to learn about the basics of Six Sigma and about various improvement tools. You will follow that up with a look at management tools for generating ideas. A look at continuous improvement is next on the agenda and the course concludes with a consideration of customer relationships. -
Microsoft Skype for Business 2016: Joining Meetings and Calls
$99.00In this course you will learn how to set up a Skype meeting, participate in meetings, present content in meetings, and add interactivity to meetings. -
Microsoft 365 Excel: Part 2: Enhancing Workbooks
$99.00Customize workbooks Manage themes Protect files Prepare a workbook for audiences -
Microsoft 365 Excel: Part 3: Exporting and Sourcing Data
$99.00Export data Use data sources Use Microsoft Forms -
Microsoft 365 Word: Part 3: Collaborating on Documents
$99.00Modify user information in a document Share a document Work with comments Compare document changes Review a document with tracked changes Merge document changes Coauthor documents -
Microsoft Skype for Business 2016: Customizing Skype for Business
$99.00In this lesson you will learn how to customize contact groups, use recording features, and customize Skype for Business options. -
Marketing and Sales
$99.00In this course, you will learn effective, low-cost, and non-cost strategies to improve sales, develop your company’s image, and build your bottom line. -
Getting Started with Microsoft 365
$99.00Navigate your account Find help and change your account settings Use desktop apps with Microsoft 365 -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.