-
Building a Brand on Social Media
$99.00In this course you will look at various social media platforms and how they can be melded into your business to promote your brand. Along the way you will learn how to decide who your audience is, how to handle negative feedback as well as how to develop a complete social media plan. -
Safety in the Workplace
$99.00This course will teach you how to create a safety culture in your organization by developing a safety committee, identifying and resolving hazards, taking proactive safety measures, developing a safety plan, and reviewing your safety program. You will also learn how to respond to, document, and investigate safety incidents. -
Social Selling for Small Businesses
$99.00In this course, you will learn about the attributes of social selling, you will learn how to explore social selling can generate business leads, how to apply social selling strategies of relevance in social media. You will also develop an understanding of the power of leveraging different platforms and how to measure results. -
Team Building: Developing High Performance Teams
$99.00After you complete this course, you will understand how to apply the TORI model, Tuckman and Jensen’s five stages of team development, and Glenn Parker’s 12 characteristics of effective teams to develop high-performance teams. You will also complete the Velsoft team player type assessment to help you identify how you behave in a team and how you can connect with others. -
Microsoft 365 Word: Online: Working with Images
$99.00In this course you will learn how to: Insert images. Resize images. and Adjust image appearance. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































