-
Hiring for Success: Behavioral Interviewing Techniques
$99.00This course will take you through the hiring process from start to finish, including cost analysis, position profiles, finding candidates, screening resumes, testing candidates, interviewing (including different types of questions), evaluating responses, and reference checks. You will also learn about some of the problems commonly encountered in the hiring process and how to overcome them. -
Networking for Success
$99.00In this course, you will learn how to identify opportunities, create a positive first impression, develop a memorable intro, start conversations, shake hands well, handle business cards, manage sticky situations, follow up with others, and organize your network. You’ll also learn how to network in online spaces, such as LinkedIn, Twitter, and Facebook. -
Microsoft 365 Outlook Part 1: Managing Your Contacts
$99.00Create and update contacts, and view and organize contacts. -
Getting Started with Microsoft 365: Managing Users
$99.00Get started as an administrator Manage users, groups, and resources in Microsoft 365 -
Promoting a Marketing Webinar
$99.00At the end of this course, you will be able to define the marketing objectives of your webinar, create an attendee avatar to connect with your target audience, create and use a lead magnet, develop a promotion strategy, explore the potential of a joint venture, and create a webinar marketing calendar. -
Creating Winning Webinars: Getting Your Message Out
$99.00This course is going to teach you to understand what webinars are and why they are important. You will also learn best practices for implementation and development of webinars. You are going to learn the appropriate structure and platform for your webinar and also how to outline a webinar. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.