-
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Creating a Top-Notch Talent Management Program
$99.00In this course, you will learn about the various aspects of talent management, including performance management, succession planning, talent management programs, employee development strategies, and employee engagement plans. -
Self-Leadership
$99.00In this course, you will explore the four pillars of self-leadership: knowing who you are, knowing what you do, knowing what you need to learn, and using what you know. -
Fundamentals of Writing
$99.00Specific learning objectives include: how to write clearly, concisely, completely, and correctly; how to make sure words agree; how to recognize and use active voice; how to write proper sentences; how to use practical and inclusive language; how to use different punctuation marks; and, how to revise and proofread. -
-
Diversity, Equity, and Inclusion
$99.00At the end of this workshop, you will: understand the importance of diversity, equity, and inclusion for workspaces; be able to describe and analyze key issues of diversity, equity and inclusion in one’s work environments and community; grasp the power of diversity as a tool for creativity, and productive collaboration in the workspace; have the opportunity to share elements of one’s culture with others; and learn that norms and practices one thinks are universal may be culturally dependent. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































