-
Unconscious Bias
$99.00This course covers the definition of unconscious bias, the importance of acknowledging and addressing unconscious bias in the workplace and personal settings, how to identify potential biases in personal and workplace settings, how to engage the Five Rs of reducing unconscious bias, and the development of plans and policies to reduce personal and workplace unconscious biases. -
Microsoft 365 Word: Online: Finalizing Your Document
$99.00In this course you will learn how to: Control page layout, Use language tools, Check the accessibility of a document, Work with comments, and Co-author documents. -
Business Succession Planning: Developing and Maintaining a Succession Plan
$139.99This course will teach you how to develop and maintain a succession plan with the SUCCESS model, which includes developing a system, identifying resources, creating risk assessments, developing action plans, implementing those plans, and evaluating the results. -
Microsoft Office 365: 2018 Feature Updates
$99.00By the end of this course, users should be comfortable using the new features released in 2018 for the desktop version of Microsoft Office 365, including features of Microsoft Word, Excel, PowerPoint, Outlook, Access, and Visio. -
Telemarketing: Using the Telephone as a Sales Tool
$99.00In this course, you will learn how to communicate effectively over the telephone, develop your personal telemarketing script, and close a sale. You’ll also learn how telemarketing can add to your sales strategy. -
Microsoft 365 Outlook Part 1: Managing Your Contacts
$99.00Create and update contacts, and view and organize contacts. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































