-
Conducting Effective Performance Reviews
$99.00This in-depth course will cover the entire performance management process, various types of performance reviews, goal setting, feedback strategies, coaching tips, techniques for handling performance problems, and ways to maintain performance. -
Microsoft 365 Excel: Part 2: Enhancing Workbooks
$99.00Customize workbooks Manage themes Protect files Prepare a workbook for audiences -
Performance Management: Managing Employee Performance
$99.00In this course, you will learn about the Shared Management Model, which helps the manager transfer motivation and responsibility for results to the employee. This course will cover all three phases of the model: preparing the employee for the job, motivating them to do it, and evaluating their performance. -
Creativity In The Workplace
$99.00After you complete this course, you will be able to, define creativity, identify the characteristics of a creative person, develop your creativity, understand the importance of creativity in the workplace, identify the benefits of creativity in the workplace, examine creative corporate cultures, foster creativity in the workplace, and apply brainstorming techniques. -
Microsoft 365 OneNote: Online: Finalizing a Notebook
$99.00In this course you will learn how to: use proofing tools, share and collaborate on notebooks, and work with notebook versions. -
Unconscious Bias
$99.00This course covers the definition of unconscious bias, the importance of acknowledging and addressing unconscious bias in the workplace and personal settings, how to identify potential biases in personal and workplace settings, how to engage the Five Rs of reducing unconscious bias, and the development of plans and policies to reduce personal and workplace unconscious biases. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































