-
Tough Topics: Talking to Employees about Personal Hygiene
$99.00This course has two major themes. First, we’ll give you a customizable framework for having tough conversations. Then, we’ll look at some common tough conversations that come up, including body odor, flatulence, poor clothing and hair decisions, and bad breath. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Creating a Google AdWords Campaign
$139.99In this one-day course, you will learn how Google AdWords work, what pay per click means, the importance of correctly setting an AdWord budget, how to select keywords and set up ad groups, how to design a compelling ad, and how to make adjustments to increase success. -
Appreciative Inquiry
$99.00In this course you will learn about the appreciative inquiry process. To begin, you’ll explore its fundamental principles and the 4-D model. You’ll also get a hands-on look at the appreciative inquiry interview guide and start considering how this powerful tool could make a difference in your organization. -
Microsoft 365 PowerPoint Online: Working with Images and Shapes
$99.00In this course you will learn how to: Insert graphics, Modify and format objects, and Adjust image appearance -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































