-
Influence and Persuasion
$99.00In this course, you will learn how to speak persuasively, communicate with confidence, build rapport, develop a strong presentation, and leverage storytelling. You’ll also receive an introduction to basic neuro linguistic programming techniques. -
Advanced Writing Skills
$139.99In this course, you will learn how to write specific kinds of documents, including letters, business cases, reports, and proposals. You will also review some fundamental writing rules, such as the four C’s of writing and paragraph construction. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Business Writing That Works
$139.99This course will teach you the four C’s of writing: clear, concise, complete, and correct. You will also learn some of the fundamentals of good writing, including word agreement, active and passive voice, sentence construction, punctuation, and spelling. Finally, you will have a chance to apply these skills to real-life situations, such as writing e-mails, memos, and letters. -
Microsoft 365 PowerPoint Online: Finishing your Presentation
$99.00In this lesson you will learn how to: Apply animations and transitions, Customize design options, Work with comments, and Co-author a presentation. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.