-
Problem Solving and Decision Making
$99.00In this course, you will learn a three-phase problem solving process that you can apply to any situation. You will also learn techniques for creative thinking, how to make good group decisions, and ways to follow up on and evaluate decisions. -
Getting Started with Microsoft 365: File Storage and Collaboration
$99.00Store files and collaborate with OneDrive for Business Manage an organization’s activity with Delve -
Microsoft 365 Outlook Part 1: Customizing the Outlook Environment
$99.00Customize the Outlook interface, and create and manage Quick Steps. -
Microsoft 365 Word: Online: Inserting Objects
$99.00In this course you will learn how to: Add headers and footers to a document, Insert footnotes and endnotes, and Insert, modify, and format tables. -
Networking for Success
$99.00In this course, you will learn how to identify opportunities, create a positive first impression, develop a memorable intro, start conversations, shake hands well, handle business cards, manage sticky situations, follow up with others, and organize your network. You’ll also learn how to network in online spaces, such as LinkedIn, Twitter, and Facebook. -
Crisis Management
$139.99To begin this course, you will learn how to put the right people in place with a crisis management team and appropriate training. Then, you will learn how to identify and assess crisis risks, develop a response process, and gather appropriate resources. You will also learn how to respond to, document, and investigate crises; establish an emergency operations center; create a continuity plan; and recover from a crisis. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































