-
Microsoft 365 Excel: Part 2: Analyzing Data with Logical and Lookup Functions
$99.00Use text functions Use logical functions Use lookup functions Use date functions Use financial functions -
Research Skills
$139.99In this course, you will learn basic research skills, such as reading, memory recall, and note-taking. You will also learn how to create different kinds of outlines for different stages of your project, and how to move from the outline to writing, editing, and polishing. As well, you’ll learn how to find information using the library’s Dewey Decimal System, journals, and the Internet. -
Introduction to Microsoft Power BI: Introduction to the Power BI Web App
$99.00In this course you will learn how to use the Power BI web app, connect to data sources from the Power BI app, and se workspaces, dashboards, reports, and other Power BI app features. -
Onboarding: The Essential Rules for a Successful Onboarding Program
$139.99This course will explore the benefits of onboarding, show you how to design an onboarding framework, give you ways to customize the program for different audiences (including managers and executives), and demonstrate how to measure results from the program. -
Developing a Safety Procedures Manual
$99.00This course helps you craft a usable manual for your workplace, or for whatever situation you require one. You will learn about safety procedures and safety procedures templates. Also, this course introduces you to how to organize the steps in a procedure and construct a flowchart. Brainstorming allows you to gather information and you will also look at guidelines for writing procedures and learn about communication aids. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.