-
Becoming a Progressive Employer: Setting Trends Instead of Following Them
$99.00In this course, you will gain an understanding of what being progressive means, and then take time to truly examine this concept through activities and discussion. You will look at the process involved in going from the status quo to being progressive, along with how to develop or enhance a progressive mindset and innovative ideas. The last part of the course involves understanding the importance of a succession plan to a progressive organization. -
Microsoft 365 Outlook: Online: Organizing Email
$99.00In this course you will learn how to: manage folders, use categories, use viewing tools, and clean up messages. -
Microsoft 365 Excel: Part 3: Excel Online
$99.00How to access and use Excel Online Features that differ between Excel Online and the Excel desktop application -
Introduction to HTML and CSS Coding: Extended Styling Techniques using HTML and CSS
$99.00In this course you will learn how to use grouping elements, change the dimensions of a div block, and use the CSS box model to format your webpage. -
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Developing a High Reliability Organization
$99.00You will learn what constitutes a High Reliability Organization (HRO), the principles behind high reliability and take a look at a real life disaster that could have benefitted from those principles. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































