-
Anger Management: Understanding Anger
$139.99This course will help you identify how anger is affecting you. You will also learn about the anger process, trigger thoughts, behavior types, and coping strategies. -
Emotional Intelligence
$99.00This course will introduce you to the history of emotional intelligence and what it’s all about. You’ll explore the most popular theories, including the EI blueprint, Martin Seligman’s ABC’s of optimism, the VALUE and SOLER techniques, Ekman’s seven basic emotions, and Plutchik’s wheel. You’ll also explore your personal values and vision statement to help guide you in your emotional intelligence development. -
Developing Your Training Program
$139.99You will start this course by considering what training is, when it is necessary, and what other options are out there. Then, you will learn the ICE method for identifying needs, a seven-step model for instructional design, and tips for building an engaging program. Next, you will walk through the steps of program design, including setting learning objectives, identifying evaluation strategies, choosing learning methodologies, finding content, creating energizers, using assessment tools, developing supporting materials, and testing the program. You will also receive tips on creating a proposal for a training program and building rapport with company sponsors. -
Microsoft Skype for Business 2016: Getting Started
$99.00In this course you will learn how to get started with Skype for Business 2016, communicate with contacts, and update your status information. -
Microsoft 365 Outlook Part 1: Managing Your Messages
$99.00Manage messages using tags, flags, and other commands, and organize messages using folders. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































