-
Microsoft 365 Excel: Part 2: Analyzing Data with PivotTables, Slicers, and PivotCharts
$99.00Create a PivotTable Filter data using slicers Analyze data using PivotCharts -
Introduction to HTML and CSS Coding Part 2: Writing Your Best Code
$99.00In this course, you will learn about, standards-compliant markup, semantic elements, proper document structure, syntax organization, organizing code with comments, writing CSS with multiple lines and spaces, using proper class names, and using shorthand properties and values. -
Workplace Violence: How to Manage Anger and Violence in the Workplace
$99.00In this course, you will learn a nine-stage plan to help organizations prevent violence. You will also learn how to respond to violent incidents, manage anger, and implement design and hiring practices that will keep employees safe. -
Performance Management: Managing Employee Performance
$99.00In this course, you will learn about the Shared Management Model, which helps the manager transfer motivation and responsibility for results to the employee. This course will cover all three phases of the model: preparing the employee for the job, motivating them to do it, and evaluating their performance. -
Business Writing That Works
$139.99This course will teach you the four C’s of writing: clear, concise, complete, and correct. You will also learn some of the fundamentals of good writing, including word agreement, active and passive voice, sentence construction, punctuation, and spelling. Finally, you will have a chance to apply these skills to real-life situations, such as writing e-mails, memos, and letters. -
Time Management: Get Organized for Peak Performance
$139.99In this course, you will learn how to organize your workflow and office space, use your planner effectively, and delegate some of your work to other people. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































