-
Microsoft 365 PowerPoint Online: Getting Started
$99.00In this course you will learn how to: Get started with PowerPoint Online, Create, edit, and view presentations, and Get help in PowerPoint Online. -
Emotional Intelligence
$99.00This course will introduce you to the history of emotional intelligence and what it’s all about. You’ll explore the most popular theories, including the EI blueprint, Martin Seligman’s ABC’s of optimism, the VALUE and SOLER techniques, Ekman’s seven basic emotions, and Plutchik’s wheel. You’ll also explore your personal values and vision statement to help guide you in your emotional intelligence development. -
Overcoming Objections to Nail the Sale
$99.00In this course, you will learn how to overcome objections, identify buying signals, and close the sale. You will also learn supporting skills, like building credibility, being observant, and communicating well. -
Creating Successful Staff Retreats
$99.00In this course you are going to learn a comprehensive approach to crafting a successful staff retreat for your organization. You are going to look at why retreats are conducted, look at retreat undertaking categories and then advance to the development and presentation of retreat activities. Your retreat education doesn’t stop there as you are also going to learn how to identify the critical elements of a staff retreat and you will learn to create a planning checklist and about the keys of running a retreat. When the retreat is over, your responsibilities aren’t, you need to evaluate how things went so you will learn how to create an evaluation and follow up. -
Microsoft 365 OneNote: Online: Working with Notes, Part Two
$99.00In this course you will learn how to: use tags and symbols, add handwritten text to a note, and use OneNote’s highlighting tools. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.