-
Microsoft 365 Excel: Online: Using Pivot-Tables
$99.00In this course you will learn how to: insert PivotTables, work with PivotTable data, and sort and filter PivotTable data. -
Workplace Violence: How to Manage Anger and Violence in the Workplace
$99.00In this course, you will learn a nine-stage plan to help organizations prevent violence. You will also learn how to respond to violent incidents, manage anger, and implement design and hiring practices that will keep employees safe. -
Microsoft 365 Word: Part 3: Adding Reference Marks and Notes
$99.00Add captions to objects Insert cross-references Add bookmarks and hyperlinks Insert footnotes and endnotes Add citations Insert a bibliography -
Employee Dispute Resolution: Mediation through Peer Review
$139.99In this course, you will learn about the peer review process, which includes a statement being filed, gathering evidence, creating the peer review panel, conducting the peer review hearing, and making a decision. -
Skills for the Administrative Assistant
$139.99In this course, you’ll learn about the elements of a professional attitude, including dressing appropriately, developing a positive outlook, being assertive, and communicating well. You’ll also learn some fundamental skills for administrative assistants, such as writing letters, managing your time, saying “no,” working with others, and dealing with stress. All of these tools will help you achieve your goals and help the people that you support achieve their goals, too. -
Promoting a Marketing Webinar
$99.00At the end of this course, you will be able to define the marketing objectives of your webinar, create an attendee avatar to connect with your target audience, create and use a lead magnet, develop a promotion strategy, explore the potential of a joint venture, and create a webinar marketing calendar. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































