-
10-Minute Presentations
$99.00At the end of this workshop, you will be able to know and use essentials of a good presentation, choose platforms that enhance your message and reach, set goals and timelines for your presentation, create engaging narrative from outline through final draft, edit and polish your presentation, offer and receive peer review and, develop best practices for future presentations. -
Negotiating for Results
$139.99In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Introduction to Microsoft Power BI: Getting Started
$99.00In this course you will learn how to describe the components of Power BI, work with Power BI files, connect to data sources with the Power BI desktop client, create a report and visualizations, and work with visualizations. -
Motivation Training: Motivating Your Workforce
$99.00To start this course, you will learn about some basic motivation theories. You will also learn about setting goals, identifying values, and ways to create a motivational climate. -
Business Writing That Works
$139.99This course will teach you the four C’s of writing: clear, concise, complete, and correct. You will also learn some of the fundamentals of good writing, including word agreement, active and passive voice, sentence construction, punctuation, and spelling. Finally, you will have a chance to apply these skills to real-life situations, such as writing e-mails, memos, and letters. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.