-
Microsoft 365 Word: Part 3: Collaborating on Documents
$99.00Modify user information in a document Share a document Work with comments Compare document changes Review a document with tracked changes Merge document changes Coauthor documents -
Crisis Management
$99.00To begin this course, you will learn how to put the right people in place with a crisis management team and appropriate training. Then, you will learn how to identify and assess crisis risks, develop a response process, and gather appropriate resources. You will also learn how to respond to, document, and investigate crises; establish an emergency operations center; create a continuity plan; and recover from a crisis. -
Marketing and Sales
$99.00In this course, you will learn effective, low-cost, and non-cost strategies to improve sales, develop your company's image, and build your bottom line. -
Collaboration
$99.00After completion of this course, you should understand the definition of collaboration, what it takes to work collaboratively with your colleagues and the advantages of collaboration. Obstacles to collaboration will be explored, and how to develop strategies to improve a collaborative work environment. As well, you will know the six steps to make collaboration work, and the difference between collaboration, cooperation and teamwork. -
The ABC’s Of Supervising Others
$99.00This course will help you overcome many of the problems that you will encounter as a workplace leader. Topics include transitioning to a supervisory role, attitudes to cultivate, setting goals, personal productivity, communication skills, feedback techniques, conflict resolution, managing difficult conversations, and establishing credibility. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.