-
Time Management: Get Organized for Peak Performance
$139.99In this course, you will learn how to organize your workflow and office space, use your planner effectively, and delegate some of your work to other people. -
Microsoft 365 PowerPoint Online: Working With Tables
$99.00In this course you will learn how to: Create, edit, and format tables. -
Introduction to HTML and CSS Coding: Getting Started with HTML
$99.00In this course you will learn how to properly type HTML code, add basic elements, including headings, paragraphs, and breaks, and create a bulleted or numbered list. -
Workplace Health and Safety: The Supervisor’s Role and Responsibilities
$99.00This course will help you learn about various aspects of a supervisor’s role in organizational health and safety, including: the employer’s responsibility to display due diligence; the three rights of workers; the responsibilities and roles of supervisors and workers; the role of the health and safety committee; the responsibilities of supervisors and workers in hazard identification, assessment and control, safety and health inspections, and accident reporting and investigation; the necessary health and safety training for employees; the importance of communicating health and safety information; and how to create an employee orientation checklist. -
Project Management Training: Understanding Project Management
$139.99This in-depth course will take you through all aspects of project management. First, you will consider what a project is and what a project manager does. Then, you will work through the four stages of the project life cycle: conceptual, planning, execution, and termination. You will also learn some supporting skills, like teamwork, communication, and presentation. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.