-
Logistics and Supply Chain Management
$99.00In this course you will learn about supply chains and logistics, various integration models, supply chain flows, who is who in a supply chain, as well as drivers and ways to optimize them. You will also gain an insight on other crucial points such as aligning your business and supply chain strategies, how to get the most out of your data, how to troubleshoot any problems that crop up and ways to develop your supply chain. -
Microsoft 365 Excel: Online: Using Pivot-Tables
$99.00In this course you will learn how to: insert PivotTables, work with PivotTable data, and sort and filter PivotTable data. -
Managing Pressure and Maintaining Balance
$139.99This course will teach you about the causes and costs of workplace pressure, the benefits of creating balance, and how to identify pressure points. You will also learn how to apply emotional intelligence, increase optimism and resilience, and develop strategies for getting ahead. -
Microsoft 365 Outlook Part 1: Reading and Responding to Messages
$99.00Customize reading options, work with attachments, and manage your message responses -
Microsoft 365 Outlook: Online: Using the Calendar Workspace
$99.00In this course you will learn how to: get started with the Calendar workspace, work with events, use the Event window, and use shared calendars. -
Microsoft 365 Word: Online: Working with Images
$99.00In this course you will learn how to: Insert images. Resize images. and Adjust image appearance. -
Change Management: Change and How to Deal With It
$139.99Some people enjoy the opportunities and excitement that change brings. Others, however, have a harder time adapting. To complicate matters, our feelings often depend on the situation. This course will teach you how to manage change in a positive way. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.