-
Intermediate Project Management
$99.00In this course, you will focus on the last three stages of the project life cycle: planning, execution, and termination. This includes identifying tasks and resources; using scheduling techniques like the work breakdown structure, Gantt charts, and network diagrams; preparing a budget; executing a project; and controlling changes. -
Microsoft 365 Outlook Part 1: Getting Started With Outlook 365
$99.00Navigate the Outlook interface, perform basic email functions, and use Outlook help. -
Process Improvement with Gap Analysis
$99.00You will learn how to embrace Process Improvement with Gap Analysis during this course which provides you with the knowledge of what gap analysis is, examples, templates, and the guidance to implement an analysis in your situation. -
Microsoft 365 Excel: Online: Adding Pictures and Shapes
$99.00In this course you will learn how to: insert pictures and shapes, and format shapes. -
Digital Citizenship: Conducting Yourself in a Digital World
$99.00You will be presented with the concept that, just as in the real world we have certain rights, responsibilities, and standards of behavior as citizens, this is true in the digital world as well. This will be supported by looking at the similarities between the two worlds. Your understanding of what digital citizenship entails will be increased by examining its three principles, each of which is comprised of three elements. You will be counselled on how to practice good citizenship using each of the elements. The course finishes up with giving you exercises designed to reinforce the principles. -
Microsoft Teams: Customizing Channels
$99.00In this course you will learn how to customize channels, and add tabs and connectors to a channel. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.