-
Leadership Skills for Supervisors: Communication, Coaching, and Conflict
$99.00In this course, you will learn about coaching models, conflict resolution techniques, and ways to communicate with your employees. You will also complete Velsoft’s signature leadership assessment to help you identify how to connect with others. As a bonus, you will receive an introduction to some important leadership theories, including the Situational Leadership II® model and servant leadership. -
Influence and Persuasion
$99.00In this course, you will learn how to speak persuasively, communicate with confidence, build rapport, develop a strong presentation, and leverage storytelling. You’ll also receive an introduction to basic neuro linguistic programming techniques. -
Introduction to Microsoft Power BI: A Closer Look at Visualizations
$99.00In this course you will learn how to create and manage the following types of visualizations: matrixes, tables, charts,maps, gauges, cards, KPIs, and slicers. -
Microsoft Skype for Business 2016: Customizing Skype for Business
$99.00In this lesson you will learn how to customize contact groups, use recording features, and customize Skype for Business options. -
Windows 10: May 2019 Update: Troubleshooting, Updates, and Security
$99.00In this course you will learn how to use automatic troubleshooting, use the Windows Update tool, and use updated Windows Security features. -
Microsoft 365 Outlook: Online: Getting Started
$99.00In this session, you will learn: about key terms associated with Microsoft Outlook, how to log into Microsoft Office, launch Outlook Online, and use its interface, about notifications, and how to get help in Outlook Online. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































