-
Overcoming Objections to Nail the Sale
$99.00In this course, you will learn how to overcome objections, identify buying signals, and close the sale. You will also learn supporting skills, like building credibility, being observant, and communicating well. -
Business Leadership: Becoming Management Material
$99.00The first part of this course will teach you about Peter Senge’s five learning disciplines: personal mastery, mental models, shared vision, team learning, and systems thinking. You will also learn about Paul Hersey and Ken Blanchard’s Situational Leadership II® model, servant leadership, and the five practices in James Kouzes and Barry Posner's “The Leadership Challenge.” In addition to these leadership models, basic skills (such as building trust, managing change, personal productivity, resolving conflict, solving problems, and leading meetings) will also be covered. -
Microsoft 365 OneNote: Online: Working with Notes, Part One
$99.00In this course you will learn how to: use formatting tools, and add images, tables, and other elements to a notebook. -
Microsoft 365 Excel: Part 2: Visualizing Data with Charts
$99.00Create charts Modify and format existing charts Create a trendline Create advanced charts -
Influence and Persuasion
$99.00In this course, you will learn how to speak persuasively, communicate with confidence, build rapport, develop a strong presentation, and leverage storytelling. You’ll also receive an introduction to basic neuro linguistic programming techniques. -
Microsoft Teams: Customizing Channels
$99.00In this course you will learn how to customize channels, and add tabs and connectors to a channel. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.