-
Intermediate Project Management
$99.00In this course, you will focus on the last three stages of the project life cycle: planning, execution, and termination. This includes identifying tasks and resources; using scheduling techniques like the work breakdown structure, Gantt charts, and network diagrams; preparing a budget; executing a project; and controlling changes. -
Creating Winning Webinars: Getting Your Message Out
$99.00This course is going to teach you to understand what webinars are and why they are important. You will also learn best practices for implementation and development of webinars. You are going to learn the appropriate structure and platform for your webinar and also how to outline a webinar. -
Microsoft 365 Outlook: Online: Using the Microsoft To Do Workspace
$99.00In this course you will learn how to: get started with the Microsoft To Do workspace, work with tasks, and manage tasks. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Introduction to Microsoft Power BI: Working with Data
$99.00In this course you will learn how to transform and sanitize data, use the Query Editor, model data, and manage relationships. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































