-
Microsoft 365 Excel: Online: Using Pivot-Tables
$99.00In this course you will learn how to: insert PivotTables, work with PivotTable data, and sort and filter PivotTable data. -
Microsoft 365 Outlook Part 1: Working with Tasks and Notes
$99.00Create and manage tasks, and manage notes. -
Negotiating for Results
$99.00In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Business Process Management
$99.00To begin this course, you will learn about business process management and three related skill areas: business analysis, enterprise content management, and business process re-engineering. Then, you will work through the five stages of the business process life cycle: vision, design, modeling, execution, monitoring, and optimization. Tools such as automation, business rules, workflow engines, what-if analysis, process mining, business activity monitoring, the balanced scorecard, Lean, and Six Sigma are also covered. -
Working Smarter: Using Technology to Your Advantage
$99.00In this course, you'll learn how to use technology to your advantage. Computers, various types of applications, software purchases, technical training, IT budgets, security, privacy, usage policies, ergonomics, instant messaging, and telecommuting are all covered. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.