-
Microsoft 365 OneNote: Online: Working with Notes, Part One
$99.00In this course you will learn how to: use formatting tools, and add images, tables, and other elements to a notebook. -
Microsoft 365 OneNote: Online: Getting Started
$99.00In this course you will learn how to: get started with OneNote Online, set up a notebook, manage pages and sections, and print and view notebooks. -
Microsoft 365 Word: Online: Getting Started
$99.00In this course you will learn how to: Get started with Word Online, Manage documents, Work with text, Find and replace text, Change view options, and Get help in Word Online. -
Microsoft 365 SharePoint: Configuring Site Settings
$99.00In this course you will learn how to: Configure site search options, Change site administration and navigation settings, and Configure site permissions. -
Prospecting for Leads Like a Pro
$139.99This course will teach you how to identify your target market, use a prospect dashboard, and set goals. You will also learn how to find prospects through networking, trade shows, lost accounts, and cold calls. -
Microsoft Skype for Business 2016: Joining Meetings and Calls
$99.00In this course you will learn how to set up a Skype meeting, participate in meetings, present content in meetings, and add interactivity to meetings. -
Microsoft 365 Excel: Online: Getting Started
$99.00In this course you will learn how to: get started with Excel Online, describe the basic components of Excel, manage workbooks, and get help in Excel Online. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.