-
Working Smarter: Using Technology to Your Advantage
$139.99In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Giving Effective Feedback
$99.00In this course, you will learn about the essential elements of feedback, important communication techniques, and a framework for informal and formal feedback. You’ll also learn some tips for receiving feedback. -
Creating a Workplace Wellness Program
$139.99To begin this course, you will consider the benefits of workplace wellness programs. Then, you will learn how to create a wellness committee, outline a wellness program, gather support for it, perform appropriate research (including a needs analysis), design an appropriate package, and get buy-in for it. You will also learn how to implement the wellness program, evaluate how it is doing, and present the results in a tangible manner. -
Introduction to HTML and CSS Coding Part 2: Writing Your Best Code
$99.00In this course, you will learn about, standards-compliant markup, semantic elements, proper document structure, syntax organization, organizing code with comments, writing CSS with multiple lines and spaces, using proper class names, and using shorthand properties and values. -
Microsoft 365 Outlook Part 1: Managing Your Calendar
$99.00View the calendar, manage appointments, manage meetings, and print your calendar. -
Microsoft 365 SharePoint: Configuring Site Settings
$99.00In this course you will learn how to: Configure site search options, Change site administration and navigation settings, and Configure site permissions. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.