-
Introduction to Neuro Linguistic Programming
$139.99This introductory course will teach the basics of neuro linguistic programming (NLP). You’ll learn about key terms, the NLP presuppositions, the NLP senses, eye cues, enriched language, clean questions, and hypnotic language. -
Microsoft 365 Excel: Part 2: Organizing Worksheet Data with Tables
$99.00Create and format tables Modify tables Use table references -
Microsoft 365 SharePoint: Configuring Site Settings
$99.00In this course you will learn how to: Configure site search options, Change site administration and navigation settings, and Configure site permissions. -
Environmental Sustainability: A Practical Approach to Greening Your Organization
$99.00Here you will learn how to draft an Environmental Management System that can be applied to your organization. Along the way you will understand the term ‘greenwashing’ and how to avoid it. You will know the six key performance indicator areas as defined by the Eco-Management and Audit Scheme and will be able to determine Environmental Impacts and Aspects within an organization then how to set objectives and targets for significant impacts. -
Microsoft 365 Outlook: Online: Using the Microsoft To Do Workspace
$99.00In this course you will learn how to: get started with the Microsoft To Do workspace, work with tasks, and manage tasks. -
Conversational Leadership
$99.00In this course, you will learn about the fundamental elements of meaningful conversations, the four-I model of organizational conversation, the conversational leadership framework, and the World Café model. All of these tools will help you become a conversational leader and build stronger teams in your workplace. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.