-
Conducting Accurate Internet Research
$99.00This course is going to provide you with the skills you will need to get the most of an Internet search. You will learn where to look for information, how to find it, and the types of information that you can, and cannot, find online. It looks at the surface web and then takes you further in your searching skills to the deep web. -
Microsoft 365 Word: Online: Getting Started
$99.00In this course you will learn how to: Get started with Word Online, Manage documents, Work with text, Find and replace text, Change view options, and Get help in Word Online. -
Bullying in the Workplace
$139.99In this course, you will learn what bullying is and what it can cost an organization. You will also learn how to protect yourself from bullying, what to do if you are bullied, and what to do if you witness bullying. -
Getting Started with Microsoft 365: Managing Security
$99.00Manage domains Monitor Microsoft 365 security and compliance -
Getting Stuff Done: Personal Development Boot Camp
$99.00To start this course, you’ll explore what personal efficiency is all about, as well as useful attitudes and skills that you might want to develop. Then, you’ll outline your vision statement, dreams, and goals. Next, you’ll learn about the 80/20 system, what characteristics your organizational system should have, how to design a functional workspace, and techniques for organizing your daily to-do items. You’ll also learn how to set up and maintain information management systems (both physical and virtual), prioritize tasks, create routines, and tackle procrastination. Finally, you’ll learn how to get organized at home. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































