-
Microsoft 365 Excel: Part 2: Working with Graphical Objects
$99.00Insert and modify graphical objects Layer and group graphical objects Incorporate SmartArt into your workbooks -
Workplace Violence: How to Manage Anger and Violence in the Workplace
$99.00In this course, you will learn a nine-stage plan to help organizations prevent violence. You will also learn how to respond to violent incidents, manage anger, and implement design and hiring practices that will keep employees safe. -
Microsoft 365 Excel: Part 3: Auditing and Error Checking
$99.00Tracing cells Error checking Evaluating formulas and using the Watch Window Data List Outlines -
Diversity Training: Celebrating Diversity in the Workplace
$99.00In this course, you will learn what diversity means and what some of its related terms are. You’ll also consider how your world has changed and how stereotypes impact people. Then, you’ll learn how to use the four cornerstones of diversity and the STOP technique to encourage a diverse workplace. You will also learn how to manage for diversity and deal with discrimination issues. -
Building an Online Business
$99.00This course will lead you from your idea to your online business. It will take a look at important components such as business plans and marketing while touching upon payments, online marketplaces, and much more. With those topics covered you will have the skills to become an online entrepreneur. -
Microsoft 365 Excel: Part 2: Analyzing Data with PivotTables, Slicers, and PivotCharts
$99.00Create a PivotTable Filter data using slicers Analyze data using PivotCharts -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































