-
Conducting Effective Performance Reviews
$99.00This in-depth course will cover the entire performance management process, various types of performance reviews, goal setting, feedback strategies, coaching tips, techniques for handling performance problems, and ways to maintain performance. -
Building Relationships for Success in Sales
$99.00This course will teach you how to leverage customer-focused selling, identify what influences relationships, expand your communication skills, manage your body language, develop a professional handshake, and grow your network. -
Developing a High Reliability Organization
$99.00You will learn what constitutes a High Reliability Organization (HRO), the principles behind high reliability and take a look at a real life disaster that could have benefitted from those principles. -
Appreciative Inquiry
$99.00In this course you will learn about the appreciative inquiry process. To begin, you’ll explore its fundamental principles and the 4-D model. You’ll also get a hands-on look at the appreciative inquiry interview guide and start considering how this powerful tool could make a difference in your organization. -
Introduction to HTML and CSS Coding Part 2: Writing Your Best Code
$99.00In this course, you will learn about, standards-compliant markup, semantic elements, proper document structure, syntax organization, organizing code with comments, writing CSS with multiple lines and spaces, using proper class names, and using shorthand properties and values. -
Introduction to HTML and CSS Coding Part 2: How to Position Content
$99.00In this course, you will learn about positioning content with floats, clearing and containing floats, positioning with inline-block, and clearing white-space when using inline-block. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































