- 
		
The Professional Supervisor
$139.99In this course, you will learn how to plan effectively, build a high-performing team, motivate employees, provide effective feedback, delegate, and manage conflict. You will also receive an introduction to several leadership theories, including John Adair’s action-centered leadership model, Paul Hersey and Ken Blanchard’s Situational Leadership II® model, and Velsoft’s signature leadership assessment. - 
		
Conflict Resolution: Getting Along In The Workplace
$99.00In this course, you will learn what conflict is all about. You will also learn about different types of conflict, stages of conflict, helping others through conflict, and creating win/win solutions. As a bonus, you will also learn supporting skills, such as communication, active listening, and body language. - 
		
Logistics and Supply Chain Management
$99.00In this course you will learn about supply chains and logistics, various integration models, supply chain flows, who is who in a supply chain, as well as drivers and ways to optimize them. You will also gain an insight on other crucial points such as aligning your business and supply chain strategies, how to get the most out of your data, how to troubleshoot any problems that crop up and ways to develop your supply chain. - 
		
Conducting Accurate Internet Research
$99.00This course is going to provide you with the skills you will need to get the most of an Internet search. You will learn where to look for information, how to find it, and the types of information that you can, and cannot, find online. It looks at the surface web and then takes you further in your searching skills to the deep web. - 
		
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan. 




































