-
Microsoft 365 Outlook Part 1: Getting Started With Outlook 365
$99.00Navigate the Outlook interface, perform basic email functions, and use Outlook help. -
Vendor Management Essentials
$75.00This course will take you through a Vendor Management process including outlining a Vendor Policy Document, developing Vendor Key Performance Indicators, assessing of potential vendor risk, describing components of a vendor contract, and monitoring the performance and relationship of vendors using questionnaires, form and auditing. -
Microsoft Teams: Getting Started
$99.00In this course you will learn how to, describe what Microsoft Teams is all about, use channels and post messages, and get help in Teams. -
Introduction to E-Mail Marketing
$50.00In this course, you will receive an in-depth introduction to e-mail marketing. Once you have completed this course, you will be ready to plan, create, and deliver e-mail marketing campaigns that build relationships with customers and get results. -
Microsoft PowerPoint Online: Working with SmartArt
$99.00In this course you will learn how to create, modify, and format SmartArt. -
Getting Started with Microsoft 365: Managing Security
$99.00Manage domains Monitor Microsoft 365 security and compliance -
Giving Effective Feedback
$75.00In this course, you will learn about the essential elements of feedback, important communication techniques, and a framework for informal and formal feedback. Youll also learn some tips for receiving feedback. -
Introduction to Microsoft Power BI: Working with Reports and Visualizations
$99.00In this course you will learn how to manage report pages, change report view options, work with visualizations and their data, and add static objects to a report. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.