-
From Boss to Leader
$99.00After completing this course, participants will know the characteristics of bad bosses and good leaders, understand how those who hold management positions can develop into good leaders, know the elements of leading by example, understand the importance of good communication and effective feedback, and know how to use emotional intelligence. -
Influence and Persuasion
$99.00In this course, you will learn how to speak persuasively, communicate with confidence, build rapport, develop a strong presentation, and leverage storytelling. You’ll also receive an introduction to basic neuro linguistic programming techniques. -
Leadership Skills for Supervisors: Communication, Coaching, and Conflict
$99.00In this course, you will learn about coaching models, conflict resolution techniques, and ways to communicate with your employees. You will also complete Velsoft’s signature leadership assessment to help you identify how to connect with others. As a bonus, you will receive an introduction to some important leadership theories, including the Situational Leadership II® model and servant leadership. -
Microsoft Sway: Working with Text and Images
$99.00In this course you will learn how to format text, and add media to a Sway project. -
Fostering Innovation
$99.00At the end of this course, you will be able to understand what fostering innovation means , learn what an innovative workplace looks like, determine how you can help create an innovative workplace environment, understand your role in helping to foster innovation, know what happens in the workplace when you help foster innovation, and describe ways that innovation can help your company. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.