-
Telemarketing: Using the Telephone as a Sales Tool
$99.00In this course, you will learn how to communicate effectively over the telephone, develop your personal telemarketing script, and close a sale. You’ll also learn how telemarketing can add to your sales strategy. -
An Environmental Audit Primer
$99.00This course will give you the tools to conduct an internal environmental audit at your workplace. You will learn of the different types of audits and about auditors and the basic steps of an audit. This course will also teach you the essential aspects of an audit checklist and how to develop a checklist based on Environmental Management System procedures. You will also explore noncompliances, corrective actions and an audit closing meeting. -
Logistics and Supply Chain Management
$99.00In this course you will learn about supply chains and logistics, various integration models, supply chain flows, who is who in a supply chain, as well as drivers and ways to optimize them. You will also gain an insight on other crucial points such as aligning your business and supply chain strategies, how to get the most out of your data, how to troubleshoot any problems that crop up and ways to develop your supply chain. -
Microsoft 365 Excel: Part 2: Analyzing Data with Logical and Lookup Functions
$99.00Use text functions Use logical functions Use lookup functions Use date functions Use financial functions -
Microsoft 365 PowerPoint Online: Working With Tables
$99.00In this course you will learn how to: Create, edit, and format tables. -
Windows 10: May 2019 Update: Troubleshooting, Updates, and Security
$99.00In this course you will learn how to use automatic troubleshooting, use the Windows Update tool, and use updated Windows Security features. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.