-
Negotiating for Results
$139.99In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Microsoft Skype for Business 2016: Joining Meetings and Calls
$99.00In this course you will learn how to set up a Skype meeting, participate in meetings, present content in meetings, and add interactivity to meetings. -
Introduction to HTML and CSS Coding: Getting Started with HTML
$99.00In this course you will learn how to properly type HTML code, add basic elements, including headings, paragraphs, and breaks, and create a bulleted or numbered list. -
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Hiring for Success: Behavioral Interviewing Techniques
$99.00This course will take you through the hiring process from start to finish, including cost analysis, position profiles, finding candidates, screening resumes, testing candidates, interviewing (including different types of questions), evaluating responses, and reference checks. You will also learn about some of the problems commonly encountered in the hiring process and how to overcome them. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.