-
Microsoft Word Online: Working with Images
$99.00In this course you will learn how to insert images, resize images, and adjust image appearance. -
Developing Your Executive Presence
$65.00This course is going to provide you with the boost you might need to get the most out of your inter-personal skills as you develop yourself into an executive with presence that will be the marvel of your coworkers and others you meet. It will help you consider the first impressions you make on others, your interpersonal skills, your speaking and listening skills, plus sharpens your leadership skills. -
Developing a Safety Procedures Manual
$50.00This course helps you craft a usable manual for your workplace, or for whatever situation you require one. You will learn about safety procedures and safety procedures templates. Also, this course introduces you to how to organize the steps in a procedure and construct a flowchart. Brainstorming allows you to gather information and you will also look at guidelines for writing procedures and learn about communication aids. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Effective Planning and Scheduling
$75.00This course will teach you how to use a variety of planning and scheduling tools, including the work breakdown structure, network diagrams, program evaluation and review technique (PERT), and Gantt charts. You will also learn how to properly estimate time, schedule resources, identify task dependencies, manage risks, communicate your schedule, and keep the schedule updated. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.
