-
Microsoft 365 Outlook: Online: Working with Email Messages
$99.00In this course you will learn how to: create and send email messages, respond to email messages in different ways, add items to a message, and manage messages. -
Making Training Stick
$99.00In this course, you’ll learn ways to help make your training workshops stickier so that the learners will retain the material better. You will familiarize yourself with strategies that can help learning to stick with the audience in an effective and meaningful way. You will learn how to keep learners focused and motivated to absorb material. Also, you will learn ways to develop an effective training style, using appropriate training aids and techniques. -
Microsoft 365 OneNote: Online: Finalizing a Notebook
$99.00In this course you will learn how to: use proofing tools, share and collaborate on notebooks, and work with notebook versions. -
Introduction to HTML and CSS Coding: Doing More with HTML
$99.00In this course you will learn how to add images in HTML, add links in HTML, and add tables in HTML. -
Logistics and Supply Chain Management
$99.00In this course you will learn about supply chains and logistics, various integration models, supply chain flows, who is who in a supply chain, as well as drivers and ways to optimize them. You will also gain an insight on other crucial points such as aligning your business and supply chain strategies, how to get the most out of your data, how to troubleshoot any problems that crop up and ways to develop your supply chain. -
Microsoft Skype for Business 2016: Getting Started
$99.00In this course you will learn how to get started with Skype for Business 2016, communicate with contacts, and update your status information. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.