-
Employee Recognition: Appreciating Your Workforce
$99.00Here you are going to learn just what an employee recognition program is all about. You’re going to consider who falls under the definition of an employee and then decide why you should provide recognition for them. You will also look at the types of recognition programs, how to lay the foundation for one, and then how to actually build, implement, and follow up on a program in your office. -
Goal Setting
$139.99In this course, you will create your personal vision, identify your values, and make a bucket list. From there, you’ll create goals with SPIRIT, set up support systems, learn how to deal with setbacks, and identify ways to get started on your journey right now. -
Conducting Accurate Internet Research
$99.00This course is going to provide you with the skills you will need to get the most of an Internet search. You will learn where to look for information, how to find it, and the types of information that you can, and cannot, find online. It looks at the surface web and then takes you further in your searching skills to the deep web. -
Microsoft 365 Outlook: Online: Using the People Workspace
$99.00In this course you will learn how to: get started with the People workspace, work with contacts, and use contact lists. -
Employee Dispute Resolution: Mediation through Peer Review
$139.99In this course, you will learn about the peer review process, which includes a statement being filed, gathering evidence, creating the peer review panel, conducting the peer review hearing, and making a decision. -
Microsoft 365 Excel: Part 3: Excel Online
$99.00How to access and use Excel Online Features that differ between Excel Online and the Excel desktop application -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































