-
Workplace Harassment: What It Is and What to Do About It
$99.00In this course, you will learn about different types of harassment. You will also learn prevention strategies (such as harassment policies and handling issues promptly), what to do if you are harassed, what to do if you are accused of harassment, and how to handle harassment as a manager. Then, you will learn a basic complaint resolution process (including how to handle false complaints), when mediation might be an option, and ways to help the workplace return to normal. -
Microsoft 365 OneNote: Online: Working with Notes, Part Two
$99.00In this course you will learn how to: use tags and symbols, add handwritten text to a note, and use OneNote’s highlighting tools. -
Developing a Safety Procedures Manual
$99.00This course helps you craft a usable manual for your workplace, or for whatever situation you require one. You will learn about safety procedures and safety procedures templates. Also, this course introduces you to how to organize the steps in a procedure and construct a flowchart. Brainstorming allows you to gather information and you will also look at guidelines for writing procedures and learn about communication aids. -
Performance Management: Managing Employee Performance
$99.00In this course, you will learn about the Shared Management Model, which helps the manager transfer motivation and responsibility for results to the employee. This course will cover all three phases of the model: preparing the employee for the job, motivating them to do it, and evaluating their performance. -
Microsoft 365 Excel: Part 1: Getting Started
$99.00Identify the basic components of Excel Create a basic worksheet Get help in Excel 365 -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.