-
Motivation Training: Motivating Your Workforce
$99.00To start this course, you will learn about some basic motivation theories. You will also learn about setting goals, identifying values, and ways to create a motivational climate. -
Identifying and Combatting Fake News
$99.00After you complete this course you will be able to: define ‘fake news’, recognize the difference between ‘fake news’ and objective reporting, understand the impacts of ‘fake news’ on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within ‘fake news’ , and create your own ‘fake news’ action plan. -
Microsoft 365 Excel: Part 2: Visualizing Data with Charts
$99.00Create charts Modify and format existing charts Create a trendline Create advanced charts -
Microsoft 365 Excel: Part 2: Enhancing Workbooks
$99.00Customize workbooks Manage themes Protect files Prepare a workbook for audiences -
Conflict Resolution: Dealing With Difficult People
$139.99In this course, you will learn the benefits of conflict, techniques for getting to the heart of the matter, anger and stress management tips, and ways to improve your own attitude. You’ll also learn a practical three-step model that will help you resolve conflict in a positive manner. -
Public Speaking: Speaking Under Pressure
$139.99This course will take you through preparing an effective presentation. Topics include planning your speech, identifying your audience, connecting with the listener, developing key themes and sentences, structuring your ideas, and managing nervousness and body language. You’ll focus on short responses and learn ways to expand a basic presentation. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































