-
Process Improvement with Gap Analysis
$99.00You will learn how to embrace Process Improvement with Gap Analysis during this course which provides you with the knowledge of what gap analysis is, examples, templates, and the guidance to implement an analysis in your situation. -
Microsoft 365 Excel: Part 2: Creating Advanced Formulas
$99.00Apply range names Use specialized functions -
Business Succession Planning: Developing and Maintaining a Succession Plan
$139.99This course will teach you how to develop and maintain a succession plan with the SUCCESS model, which includes developing a system, identifying resources, creating risk assessments, developing action plans, implementing those plans, and evaluating the results. -
Working Smarter: Using Technology to Your Advantage
$139.99In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Microsoft 365 Excel: Part 2: Working with Graphical Objects
$99.00Insert and modify graphical objects Layer and group graphical objects Incorporate SmartArt into your workbooks -
Making Training Stick
$99.00In this course, you’ll learn ways to help make your training workshops stickier so that the learners will retain the material better. You will familiarize yourself with strategies that can help learning to stick with the audience in an effective and meaningful way. You will learn how to keep learners focused and motivated to absorb material. Also, you will learn ways to develop an effective training style, using appropriate training aids and techniques. -
Microsoft 365 OneNote: Online: Getting Started
$99.00In this course you will learn how to: get started with OneNote Online, set up a notebook, manage pages and sections, and print and view notebooks. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.