-
Research Skills
$139.99In this course, you will learn basic research skills, such as reading, memory recall, and note-taking. You will also learn how to create different kinds of outlines for different stages of your project, and how to move from the outline to writing, editing, and polishing. As well, you’ll learn how to find information using the library’s Dewey Decimal System, journals, and the Internet. -
Microsoft 365 PowerPoint Online: Developing a PowerPoint Presentation
$99.00In this course you will learn how to: Build a presentation, Edit text and objects, and Format text and paragraphs. -
Microsoft 365 Word: Online: Finalizing Your Document
$99.00In this course you will learn how to: Control page layout, Use language tools, Check the accessibility of a document, Work with comments, and Co-author documents. -
Microsoft 365 Outlook Part 1: Getting Started With Outlook 365
$99.00Navigate the Outlook interface, perform basic email functions, and use Outlook help. -
Building Your Self Esteem and Assertiveness Skills
$139.99In this course, you will explore what self-esteem is and where low self-esteem comes from. You will also learn ways to build your self-esteem, get what you want, and make others feel better about themselves. -
Anger Management: Understanding Anger
$139.99This course will help you identify how anger is affecting you. You will also learn about the anger process, trigger thoughts, behavior types, and coping strategies. -
Problem Solving and Decision Making
$99.00In this course, you will learn a three-phase problem solving process that you can apply to any situation. You will also learn techniques for creative thinking, how to make good group decisions, and ways to follow up on and evaluate decisions. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































