-
Prospecting for Leads Like a Pro
$139.99This course will teach you how to identify your target market, use a prospect dashboard, and set goals. You will also learn how to find prospects through networking, trade shows, lost accounts, and cold calls. -
Microsoft 365 Outlook Part 1: Customizing the Outlook Environment
$99.00Customize the Outlook interface, and create and manage Quick Steps. -
Getting Your Job Search Started
$139.99In this course, you will learn how to manage change, identify your values and skills, consider your vocation, find jobs, network, and set goals. Then, you should be ready to start the search for your dream job. -
Self-Leadership
$99.00In this course, you will explore the four pillars of self-leadership: knowing who you are, knowing what you do, knowing what you need to learn, and using what you know. -
Microsoft 365 Excel: Part 3: Excel Online
$99.00How to access and use Excel Online Features that differ between Excel Online and the Excel desktop application -
Marketing and Sales
$99.00In this course, you will learn effective, low-cost, and non-cost strategies to improve sales, develop your company’s image, and build your bottom line. -
GDPR Readiness: Getting the Message Out
$99.00In this one-day course, you will learn: about internal communication methods, about privacy training, and promoting a good privacy culture,about the elements of a good customer privacy policy, how to write and design a cookie banner disclaimer for your website, and how to design a privacy-compliant web form. -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.