-
Becoming a Progressive Employer: Setting Trends Instead of Following Them
$99.00In this course, you will gain an understanding of what being progressive means, and then take time to truly examine this concept through activities and discussion. You will look at the process involved in going from the status quo to being progressive, along with how to develop or enhance a progressive mindset and innovative ideas. The last part of the course involves understanding the importance of a succession plan to a progressive organization. -
Microsoft 365 Teams: Customizing Your Teams Experience
$99.00Manage your Teams profile Manage teams Add bots and apps to Teams -
Working Smarter: Using Technology to Your Advantage
$139.99In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Microsoft 365 Excel: Part 3: Data Analysis and Presentation
$99.00Use the Quick Analysis tool Add sparklines Perform What-If analysis Load and use the Analysis ToolPak -
10-Minute Presentations
$99.00At the end of this workshop, you will be able to know and use essentials of a good presentation, choose platforms that enhance your message and reach, set goals and timelines for your presentation, create engaging narrative from outline through final draft, edit and polish your presentation, offer and receive peer review and, develop best practices for future presentations. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.