-
Knowledge Management
$99.00In this course, you will learn what knowledge is, what knowledge management is, how tacit and explicit knowledge are different, and the business benefits that knowledge management can bring. Then, you will learn about the knowledge management mix (which includes people, technology, and process) as well as a four step process for building your knowledge management framework. You will also learn about four knowledge management models: Bukowitz and Williams’ KM Process Framework, Gamble and Blackwell’s knowledge management matrix, Botha’s process model, and Nonaka and Takeuchi’s spiral model. Implementation aspects, such as knowledge management teams, post-mortem plans, KMBOKs, Chief Knowledge Officers, and pilot programs, are covered as well. -
Telemarketing: Using the Telephone as a Sales Tool
$99.00In this course, you will learn how to communicate effectively over the telephone, develop your personal telemarketing script, and close a sale. You’ll also learn how telemarketing can add to your sales strategy. -
10-Minute Presentations
$99.00At the end of this workshop, you will be able to know and use essentials of a good presentation, choose platforms that enhance your message and reach, set goals and timelines for your presentation, create engaging narrative from outline through final draft, edit and polish your presentation, offer and receive peer review and, develop best practices for future presentations. -
Intrapreneurship
$99.00In this course, you’ll learn what intrapreneurship is all about. You will learn about the history and culture of intrapreneurship and assess your own intrapreneurial qualities. You’ll also explore different ways that you can contribute to the intrapreneurial process. As well, you’ll learn how to develop, screen, sell, and implement your ideas. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan. -
Microsoft 365 Outlook: Online: Working with Email Messages
$99.00In this course you will learn how to: create and send email messages, respond to email messages in different ways, add items to a message, and manage messages. -
Inventory Management: The Nuts and Bolts
$99.00In this course, you will learn about all aspects of inventory management, including common terms, the inventory cycle, how to maintain inventory accuracy, and what some of the latest trends are. -
Microsoft 365 PowerPoint Online: Working With Tables
$99.00In this course you will learn how to: Create, edit, and format tables. -
Unconscious Bias
$99.00This course covers the definition of unconscious bias, the importance of acknowledging and addressing unconscious bias in the workplace and personal settings, how to identify potential biases in personal and workplace settings, how to engage the Five Rs of reducing unconscious bias, and the development of plans and policies to reduce personal and workplace unconscious biases. -
Windows 10: May 2019 Update: Windows Settings and Storage
$99.00In this course you will learn how to use the updated Settings app, and use the updated Storage settings. -
Growth Hacking
$99.00In this one-day course, you will learn how to: identify the growth hacking mindset, recognize the differences between growth hacking and marketing, identify the customer need your business can fill, create and implement product placement and services to fit the need, learn and practice techniques of growth hacking, review and practice growth marketing strategies, identify the essentials of conversion and optimization, and create your own growth hacking plan.