-
Digital Transformation
$99.00This course aims to define digital transformation, and provide an understanding of why it matters, as well as take a look at businesses that are successfully undertaking this change. It will also help you begin developing a digital strategy for your own company. -
Introduction to Microsoft Power BI: A Closer Look at Visualizations
$99.00In this course you will learn how to create and manage the following types of visualizations: matrixes, tables, charts,maps, gauges, cards, KPIs, and slicers. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Basic Internet Marketing
$139.99In this course, you will learn how to market online, where your target market is, and what results you are getting. You will also learn about search engine optimization, e-mail campaigns, pay per click advertising, and more. -
Introduction to Microsoft Power BI: Introduction to the Power BI Web App
$99.00In this course you will learn how to use the Power BI web app, connect to data sources from the Power BI app, and se workspaces, dashboards, reports, and other Power BI app features. -
Generation Gap: Closing the Gap in the Workplace
$139.99During this course, you will consider whether defining the actual limits of each generation is most important, or whether the merits of people within the context of employment is the bigger issue. You will learn about the various types of generations and how human resource practices can bridge the gap. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.