-
Microsoft 365 Outlook Part 1: Managing Your Contacts
$99.00Create and update contacts, and view and organize contacts. -
Bullying in the Workplace
$139.99In this course, you will learn what bullying is and what it can cost an organization. You will also learn how to protect yourself from bullying, what to do if you are bullied, and what to do if you witness bullying. -
Intrapreneurship
$99.00In this course, you’ll learn what intrapreneurship is all about. You will learn about the history and culture of intrapreneurship and assess your own intrapreneurial qualities. You’ll also explore different ways that you can contribute to the intrapreneurial process. As well, you’ll learn how to develop, screen, sell, and implement your ideas. -
Story Marketing for Small Businesses
$99.00This course covers the essential elements of a story marketing campaign, from a review of company message and brand, to the elements of good storytelling. The course leads participants through the steps of creating a marketing story — knowing your company, knowing and connecting with customers, and the story writing and editing process. This creates a clear and engaging path that will lead customers to your products and services and encourage them to respond to your call to action. -
Microsoft 365 Outlook: Online: Using the Calendar Workspace
$99.00In this course you will learn how to: get started with the Calendar workspace, work with events, use the Event window, and use shared calendars. -
Windows 10: May 2019 Update: Windows Settings and Storage
$99.00In this course you will learn how to use the updated Settings app, and use the updated Storage settings. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.