-
Transgender Employees: Creating an Inclusive Work Community
$99.00In this course, you are going to learn about the importance and elements of safe inclusive workspaces for transgendered persons – those identifying as one gender but born into the body of the opposing gender. You will consider terminology, elements, policies, and resources to build and sustain a safe, inclusive environment for transgendered employees and increase the comfort level and productivity off all in your organization. -
Becoming a Progressive Employer: Setting Trends Instead of Following Them
$99.00In this course, you will gain an understanding of what being progressive means, and then take time to truly examine this concept through activities and discussion. You will look at the process involved in going from the status quo to being progressive, along with how to develop or enhance a progressive mindset and innovative ideas. The last part of the course involves understanding the importance of a succession plan to a progressive organization. -
Microsoft 365 OneNote: Online: Getting Started
$99.00In this course you will learn how to: get started with OneNote Online, set up a notebook, manage pages and sections, and print and view notebooks. -
Team Building: Developing High Performance Teams
$99.00After you complete this course, you will understand how to apply the TORI model, Tuckman and Jensen’s five stages of team development, and Glenn Parker’s 12 characteristics of effective teams to develop high-performance teams. You will also complete the Velsoft team player type assessment to help you identify how you behave in a team and how you can connect with others. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































