-
Survival Skills for the New Trainer
$139.99In this course, you will learn the basic skills that every trainer must have. This includes dressing appropriately, being assertive, being genuine, communicating well, connecting with people, handling difficult participants, and a desire to learn. At the end of the course, you’ll review a list of do’s and don’ts and consider your next steps. -
Conducting Accurate Internet Research
$99.00This course is going to provide you with the skills you will need to get the most of an Internet search. You will learn where to look for information, how to find it, and the types of information that you can, and cannot, find online. It looks at the surface web and then takes you further in your searching skills to the deep web. -
Microsoft 365 PowerPoint Online: Getting Started
$99.00In this course you will learn how to: Get started with PowerPoint Online, Create, edit, and view presentations, and Get help in PowerPoint Online. -
Leadership Skills for Supervisors: Communication, Coaching, and Conflict
$99.00In this course, you will learn about coaching models, conflict resolution techniques, and ways to communicate with your employees. You will also complete Velsoft’s signature leadership assessment to help you identify how to connect with others. As a bonus, you will receive an introduction to some important leadership theories, including the Situational Leadership II® model and servant leadership. -
Microsoft Skype for Business 2016: Customizing Skype for Business
$99.00In this lesson you will learn how to customize contact groups, use recording features, and customize Skype for Business options. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































