-
Emotional Intelligence
$99.00This course will introduce you to the history of emotional intelligence and what it’s all about. You’ll explore the most popular theories, including the EI blueprint, Martin Seligman’s ABC’s of optimism, the VALUE and SOLER techniques, Ekman’s seven basic emotions, and Plutchik’s wheel. You’ll also explore your personal values and vision statement to help guide you in your emotional intelligence development. -
Lean Process Improvement
$99.00This course will teach you the foundations of Lean through the Toyota precepts and the five critical improvement concepts (value, waste, variation, complexity, and continuous improvement). Then, you will learn about tools to perform continuous improvement in your organization, including 5S, 5W-2H, PDSA, DMAIC, Kaizen, Genchi Genbutsu, and Lean data mapping methods. -
Microsoft 365 Excel: Part 1: Getting Started
$99.00Identify the basic components of Excel Create a basic worksheet Get help in Excel 365 -
Introduction to HTML and CSS Coding Part 2: Complex Selectors
$99.00In this course, you will learn how to use commonly used selectors, child selectors, attribute selectors, and pseudo-selectors. -
Microsoft 365 Word: Online: Formatting Text and Paragraphs
$99.00In this course you will learn how to: Apply character formatting, Create lists, Control paragraph layout, and Apply styles to text. -
Getting Started with Microsoft 365: Managing Security
$99.00Manage domains Monitor Microsoft 365 security and compliance -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.