-
Becoming a Progressive Employer: Setting Trends Instead of Following Them
$99.00In this course, you will gain an understanding of what being progressive means, and then take time to truly examine this concept through activities and discussion. You will look at the process involved in going from the status quo to being progressive, along with how to develop or enhance a progressive mindset and innovative ideas. The last part of the course involves understanding the importance of a succession plan to a progressive organization. -
Business Etiquette: Gaining That Extra Edge
$139.99In this course, you’ll learn all about business etiquette. First, you will learn tips for meeting new people, which includes a good handshake, knowing how to handle business cards, making small talk, remembering names, and crafting a good first impression. Then, you’ll learn how to dress for success, dine with confidence, and present yourself well on the phone and via e-mail. -
Tough Topics: Talking to Employees about Personal Hygiene
$99.00This course has two major themes. First, we’ll give you a customizable framework for having tough conversations. Then, we’ll look at some common tough conversations that come up, including body odor, flatulence, poor clothing and hair decisions, and bad breath. -
Introduction to HTML and CSS Coding Part 2: Responsive Web Design
$99.00In this course, you will learn how to use flexible layouts, media queries, and flexible media. -
Introduction to E-Mail Marketing
$99.00In this course, you will receive an in-depth introduction to e-mail marketing. Once you have completed this course, you will be ready to plan, create, and deliver e-mail marketing campaigns that build relationships with customers and get results. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































