-
Knowledge Management
$99.00In this course, you will learn what knowledge is, what knowledge management is, how tacit and explicit knowledge are different, and the business benefits that knowledge management can bring. Then, you will learn about the knowledge management mix (which includes people, technology, and process) as well as a four step process for building your knowledge management framework. You will also learn about four knowledge management models: Bukowitz and Williams’ KM Process Framework, Gamble and Blackwell’s knowledge management matrix, Botha’s process model, and Nonaka and Takeuchi’s spiral model. Implementation aspects, such as knowledge management teams, post-mortem plans, KMBOKs, Chief Knowledge Officers, and pilot programs, are covered as well. -
Conflict Resolution: Getting Along In The Workplace
$99.00In this course, you will learn what conflict is all about. You will also learn about different types of conflict, stages of conflict, helping others through conflict, and creating win/win solutions. As a bonus, you will also learn supporting skills, such as communication, active listening, and body language. -
Windows 10: May 2019 Update: Getting Started
$99.00In this course you will learn about the Windows 10 May 2019 Update and what it includes. You will also learn how to update Windows 10 to the May 2019 Update. and sign into Windows 10. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.