-
Creative Thinking and Innovation
$99.00In this course, you will identify ways to develop your creative side and build a creative environment. You’ll also learn a basic problem-solving process, individual creative thinking tools (such as the RAP model, shoe swap technique, mind mapping, metaphors, and toys), and team-based creative thinking tools (such as brainstorming, brainwriting, rolestorming, the stepladder technique, and slip writing). -
Employee Accountability
$139.99You will begin this course by exploring what accountability is all about and some recent events that have caused people to look at accountability more closely. Then, you’ll learn ways to build accountability and ownership in your organization and make yourself more accountable. Supporting skills, like goal setting, feedback, and delegation, are also covered. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Introduction to Microsoft Power BI: Working with Data
$99.00In this course you will learn how to transform and sanitize data, use the Query Editor, model data, and manage relationships. -
Building Your Self Esteem and Assertiveness Skills
$139.99In this course, you will explore what self-esteem is and where low self-esteem comes from. You will also learn ways to build your self-esteem, get what you want, and make others feel better about themselves. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.