-
Introduction to HTML and CSS Coding Part 2: Responsive Web Design
$99.00In this course, you will learn how to use flexible layouts, media queries, and flexible media. -
Public Speaking: Presentation Survival School
$139.99This course will teach you how to manage your thoughts, body language, nervousness, and speech patterns to present yourself professionally. You’ll also learn how to present at meetings, use the five-S pattern to prepare a good presentation, and punch up your presentation with visual aids. As a bonus, you’ll complete Velsoft’s signature personality assessment to help you identify your strengths and weaknesses as a speaker. -
Business Process Management
$99.00To begin this course, you will learn about business process management and three related skill areas: business analysis, enterprise content management, and business process re-engineering. Then, you will work through the five stages of the business process life cycle: vision, design, modeling, execution, monitoring, and optimization. Tools such as automation, business rules, workflow engines, what-if analysis, process mining, business activity monitoring, the balanced scorecard, Lean, and Six Sigma are also covered. -
GDPR Readiness: Getting the Message Out
$99.00In this one-day course, you will learn: about internal communication methods, about privacy training, and promoting a good privacy culture,about the elements of a good customer privacy policy, how to write and design a cookie banner disclaimer for your website, and how to design a privacy-compliant web form. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.