-
Hiring for Success: Behavioral Interviewing Techniques
$99.00This course will take you through the hiring process from start to finish, including cost analysis, position profiles, finding candidates, screening resumes, testing candidates, interviewing (including different types of questions), evaluating responses, and reference checks. You will also learn about some of the problems commonly encountered in the hiring process and how to overcome them. -
Windows 10: May 2019 Update: Windows Settings and Storage
$99.00In this course you will learn how to use the updated Settings app, and use the updated Storage settings. -
Microsoft 365 OneNote: Online: Finalizing a Notebook
$99.00In this course you will learn how to: use proofing tools, share and collaborate on notebooks, and work with notebook versions. -
Growth Hacking
$99.00In this one-day course, you will learn how to: identify the growth hacking mindset, recognize the differences between growth hacking and marketing, identify the customer need your business can fill, create and implement product placement and services to fit the need, learn and practice techniques of growth hacking, review and practice growth marketing strategies, identify the essentials of conversion and optimization, and create your own growth hacking plan. -
Introduction to Microsoft Power BI: Getting Started
$99.00In this course you will learn how to describe the components of Power BI, work with Power BI files, connect to data sources with the Power BI desktop client, create a report and visualizations, and work with visualizations. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.