-
Honing and Delivering Your Message
$99.00Learn how to clarify your message and how to present it, successfully communicate your message, and ensure your listeners hear what you want to get across to them with the Honing and Delivering Your Message course. -
Microsoft 365 Word: Part 3: Managing Document Versions
$99.00Create a new document version using Microsoft Word and Microsoft SharePoint Server Compare document versions Merge document versions -
Digital Transformation
$99.00This course aims to define digital transformation, and provide an understanding of why it matters, as well as take a look at businesses that are successfully undertaking this change. It will also help you begin developing a digital strategy for your own company. -
Windows 10: May 2019 Update: Getting Started
$99.00In this course you will learn about the Windows 10 May 2019 Update and what it includes. You will also learn how to update Windows 10 to the May 2019 Update. and sign into Windows 10. -
Microsoft Teams: Using Other Communication Tools
$99.00In this course you will learn how to use chat, and manage meetings and files. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Kickstarting Your Business with Crowdsourcing
$99.00This course will show you how to leverage all types of crowdsourcing (including microwork, macrowork, crowdvoting, crowdcontests, crowdwisdom, and crowdfunding) to kickstart your business’ growth. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.