-
Conflict Resolution: Getting Along In The Workplace
$99.00In this course, you will learn what conflict is all about. You will also learn about different types of conflict, stages of conflict, helping others through conflict, and creating win/win solutions. As a bonus, you will also learn supporting skills, such as communication, active listening, and body language. -
Creating a Google AdWords Campaign
$139.99In this one-day course, you will learn how Google AdWords work, what pay per click means, the importance of correctly setting an AdWord budget, how to select keywords and set up ad groups, how to design a compelling ad, and how to make adjustments to increase success. -
Microsoft 365 Outlook Part 1: Managing Your Messages
$99.00Manage messages using tags, flags, and other commands, and organize messages using folders. -
Inventory Management: The Nuts and Bolts
$99.00In this course, you will learn about all aspects of inventory management, including common terms, the inventory cycle, how to maintain inventory accuracy, and what some of the latest trends are. -
GDPR Readiness: Creating a Data Privacy Plan
$99.00After completion of this course, you should be able to explain what a data privacy plan will include, know the important terminology and legislation regarding data privacy, map the flow of data in an organization visually, understand and write an information request procedure, develop an internal data handling procedure, understand and write a data security policy, understand and write a personal data protection policy, adapt your current client privacy policy, develop a data breach procedure, decide on training solutions for data privacy, know the other necessary pieces of the data privacy plan and help your organization write, implement, and review a data privacy plan. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































