-
Working Smarter: Using Technology to Your Advantage
$139.99In this course, you’ll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Making Your Business Better
$99.00This course demonstrates how various factors work together to ensure a company flourishes. Students will be guided through positioning and pricing, marketing, selling, negotiating, responding to RFQs, project management, team building, productivity, and strategic planning. Other courses that may be of interest to the student are Building Your Self Esteem and Assertiveness Skills, Business Leadership, Business Ethics in the Office, Creating a Positive Work Environment, and Getting Stuff Done - Personal Development Boot Camp. -
Microsoft 365 Outlook Part 1: Customizing the Outlook Environment
$99.00Customize the Outlook interface, and create and manage Quick Steps. -
Progressive Discipline
$99.00This course will ensure that all staff members understand the importance and use of progressive discipline. It starts by examining ways to minimizing disciplinary issues and after defining discipline, discipline policies and progressive discipline, it gives hands-on experience with verbal warnings, written warnings, performance improvement plans and termination, using thought exercises and scenarios. -
Microsoft 365 Excel: Part 2: Enhancing Workbooks
$99.00Customize workbooks Manage themes Protect files Prepare a workbook for audiences -
Microsoft 365 SharePoint: Creating a New Site
$99.00In this course you will learn how to: Create, customize, and design a SharePoint site. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.