-
Survival Skills for the New Trainer
$139.99In this course, you will learn the basic skills that every trainer must have. This includes dressing appropriately, being assertive, being genuine, communicating well, connecting with people, handling difficult participants, and a desire to learn. At the end of the course, you’ll review a list of do’s and don’ts and consider your next steps. -
Time Management: Get Organized for Peak Performance
$139.99In this course, you will learn how to organize your workflow and office space, use your planner effectively, and delegate some of your work to other people. -
Microsoft 365 OneNote: Online: Working with Notes, Part One
$99.00In this course you will learn how to: use formatting tools, and add images, tables, and other elements to a notebook. -
Conflict Resolution: Dealing With Difficult People
$139.99In this course, you will learn the benefits of conflict, techniques for getting to the heart of the matter, anger and stress management tips, and ways to improve your own attitude. You’ll also learn a practical three-step model that will help you resolve conflict in a positive manner. -
Lean Process Improvement
$99.00This course will teach you the foundations of Lean through the Toyota precepts and the five critical improvement concepts (value, waste, variation, complexity, and continuous improvement). Then, you will learn about tools to perform continuous improvement in your organization, including 5S, 5W-2H, PDSA, DMAIC, Kaizen, Genchi Genbutsu, and Lean data mapping methods. -
Microsoft 365 Word: Part 3: Managing Document Versions
$99.00Create a new document version using Microsoft Word and Microsoft SharePoint Server Compare document versions Merge document versions -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.