-
Windows 10: May 2019 Update: Getting Started
$99.00In this course you will learn about the Windows 10 May 2019 Update and what it includes. You will also learn how to update Windows 10 to the May 2019 Update. and sign into Windows 10. -
Microsoft 365 OneNote: Online: Getting Started
$99.00In this course you will learn how to: get started with OneNote Online, set up a notebook, manage pages and sections, and print and view notebooks. -
Lean Process Improvement
$99.00This course will teach you the foundations of Lean through the Toyota precepts and the five critical improvement concepts (value, waste, variation, complexity, and continuous improvement). Then, you will learn about tools to perform continuous improvement in your organization, including 5S, 5W-2H, PDSA, DMAIC, Kaizen, Genchi Genbutsu, and Lean data mapping methods. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Appreciative Inquiry
$99.00In this course you will learn about the appreciative inquiry process. To begin, you’ll explore its fundamental principles and the 4-D model. You’ll also get a hands-on look at the appreciative inquiry interview guide and start considering how this powerful tool could make a difference in your organization. -
Microsoft 365 Outlook: Online: Working with Email Messages
$99.00In this course you will learn how to: create and send email messages, respond to email messages in different ways, add items to a message, and manage messages. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.