-
Microsoft Excel Online: Finalizing Workbooks
$99.00In this course you will learn how to use comments, manage worksheets, and change view options. -
Using Activities to Make Training Fun
$99.00In this course, you will explore different types of games, including icebreakers, energizers, simulations, and case studies. You will also learn how to get buy-in, deal with reluctant participants, troubleshoot games, and create your own games. To top things off, we will give you four activities that you can customize and re-use in your own training sessions. -
Microsoft 365 Excel: Part 1: Modifying a Worksheet
$99.00Format text and cells Align cell contents Use Find & Select tools Use Spell Checking -
-
E-Commerce Management
$99.00This course will give you the skills to develop, design, test and successfully run your e-commerce business. It looks at important components such as business plans and marketing while touching upon payment methods, software solutions, security and fraud awareness, and much more. With those topics covered you will have the skills to take your e-commerce business to the next level. -
Introduction to Microsoft Power BI: Working with Reports and Visualizations
$99.00In this course you will learn how to manage report pages, change report view options, work with visualizations and their data, and add static objects to a report. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































