-
Advanced Skills for the Practical Trainer
$139.99To begin, you will explore the trainer’s role and what skills and competencies trainers should have. Then you will learn about the learning process and different learning styles, and apply that knowledge to designing programs and motivating learners. You will also learn ways to manage the stress of training, plan a workshop, and lead a training session. Then, you will learn techniques for dealing with difficult participants, evaluating learning, and conducting on-the-job follow-up. Alternative training methods, such as eLearning, co-facilitation, and team teaching will also be covered. -
Microsoft 365 Outlook: Online: Organizing Email
$99.00In this course you will learn how to: manage folders, use categories, use viewing tools, and clean up messages. -
Meeting Management: The Art of Making Meetings Work
$139.99In this course, you will learn how to prepare for meetings, develop agendas, lead a meeting, differentiate between process and content, use facilitation skills in a meeting, and manage difficult participants. -
Honing and Delivering Your Message
$99.00Learn how to clarify your message and how to present it, successfully communicate your message, and ensure your listeners hear what you want to get across to them with the Honing and Delivering Your Message course. -
Microsoft 365 Outlook Part 1: Reading and Responding to Messages
$99.00Customize reading options, work with attachments, and manage your message responses -
Knowledge Management
$99.00In this course, you will learn what knowledge is, what knowledge management is, how tacit and explicit knowledge are different, and the business benefits that knowledge management can bring. Then, you will learn about the knowledge management mix (which includes people, technology, and process) as well as a four step process for building your knowledge management framework. You will also learn about four knowledge management models: Bukowitz and Williams’ KM Process Framework, Gamble and Blackwell’s knowledge management matrix, Botha’s process model, and Nonaka and Takeuchi’s spiral model. Implementation aspects, such as knowledge management teams, post-mortem plans, KMBOKs, Chief Knowledge Officers, and pilot programs, are covered as well. -
Global Business Strategies
$99.00This course provides an overview of the various factors that a business must consider before going global. Students will also begin considering how they can expand their business to the global marketplace using a variety of planning techniques. We strongly recommend that participants complete our “Entrepreneurship 101” and “Basic Business Management” programs before taking this course. -
Unconscious Bias
$99.00This course covers the definition of unconscious bias, the importance of acknowledging and addressing unconscious bias in the workplace and personal settings, how to identify potential biases in personal and workplace settings, how to engage the Five Rs of reducing unconscious bias, and the development of plans and policies to reduce personal and workplace unconscious biases. -
Workplace Harassment: What It Is and What to Do About It
$99.00In this course, you will learn about different types of harassment. You will also learn prevention strategies (such as harassment policies and handling issues promptly), what to do if you are harassed, what to do if you are accused of harassment, and how to handle harassment as a manager. Then, you will learn a basic complaint resolution process (including how to handle false complaints), when mediation might be an option, and ways to help the workplace return to normal. -
Microsoft 365 Excel: Online: Adding Pictures and Shapes
$99.00In this course you will learn how to: insert pictures and shapes, and format shapes. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































