-
Logistics and Supply Chain Management
$99.00In this course you will learn about supply chains and logistics, various integration models, supply chain flows, who is who in a supply chain, as well as drivers and ways to optimize them. You will also gain an insight on other crucial points such as aligning your business and supply chain strategies, how to get the most out of your data, how to troubleshoot any problems that crop up and ways to develop your supply chain. -
Microsoft 365 SharePoint: User’s Guide
$99.00In this course you will learn how to: Get started with SharePoint, Work with files, and Use advanced features. -
Creating a Top-Notch Talent Management Program
$99.00In this course, you will learn about the various aspects of talent management, including performance management, succession planning, talent management programs, employee development strategies, and employee engagement plans. -
Developing a Safety Procedures Manual
$99.00This course helps you craft a usable manual for your workplace, or for whatever situation you require one. You will learn about safety procedures and safety procedures templates. Also, this course introduces you to how to organize the steps in a procedure and construct a flowchart. Brainstorming allows you to gather information and you will also look at guidelines for writing procedures and learn about communication aids. -
Creating Winning Proposals
$99.00In this course, you will learn how to locate potential funders and how to match funders’ interests with organizational needs. Along the way you will also learn the basic elements of proposal writing for not-for-profit organizations and learn to understand the process for successful proposal writing and how to build effective relationships with funders. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.