- 
		Microsoft 365 Word: Part 3: Simplifying and Managing Long Documents$99.00Add cover pages and blank pages to a document Insert an index Insert a table of contents Insert ancillary tables, such as tables of figures and authorities Manage document outlines Create master and subdocuments
- 
		Microsoft Teams: Getting Started$99.00In this course you will learn how to, describe what Microsoft Teams is all about, use channels and post messages, and get help in Teams.
- 
		Creating Winning Webinars: Getting Your Message Out$99.00This course is going to teach you to understand what webinars are and why they are important. You will also learn best practices for implementation and development of webinars. You are going to learn the appropriate structure and platform for your webinar and also how to outline a webinar.
- 
		Microsoft Office 365: 2018 Feature Updates$99.00By the end of this course, users should be comfortable using the new features released in 2018 for the desktop version of Microsoft Office 365, including features of Microsoft Word, Excel, PowerPoint, Outlook, Access, and Visio.
- 
		From Boss to Leader$99.00After completing this course, participants will know the characteristics of bad bosses and good leaders, understand how those who hold management positions can develop into good leaders, know the elements of leading by example, understand the importance of good communication and effective feedback, and know how to use emotional intelligence.
- 
		Microsoft 365 Excel: Part 1: Getting Started$99.00Identify the basic components of Excel Create a basic worksheet Get help in Excel 365
- 
		Cybersecurity 1: Fundamentals for Employees$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































