-
Human Resources Training: HR for the Non-HR Manager
$99.00This course will introduce you to basic human resource functions, including hiring, orientation, training, performance management, diversity, privacy, and disciplinary issues. -
Diversity Training: Celebrating Diversity in the Workplace
$99.00In this course, you will learn what diversity means and what some of its related terms are. You’ll also consider how your world has changed and how stereotypes impact people. Then, you’ll learn how to use the four cornerstones of diversity and the STOP technique to encourage a diverse workplace. You will also learn how to manage for diversity and deal with discrimination issues. -
Research Skills
$139.99In this course, you will learn basic research skills, such as reading, memory recall, and note-taking. You will also learn how to create different kinds of outlines for different stages of your project, and how to move from the outline to writing, editing, and polishing. As well, you’ll learn how to find information using the library’s Dewey Decimal System, journals, and the Internet. -
Progressive Discipline
$99.00This course will ensure that all staff members understand the importance and use of progressive discipline. It starts by examining ways to minimizing disciplinary issues and after defining discipline, discipline policies and progressive discipline, it gives hands-on experience with verbal warnings, written warnings, performance improvement plans and termination, using thought exercises and scenarios. -
Microsoft 365 Excel: Part 1: Managing Large Workbooks
$99.00Format worksheet tabs Manage worksheets Manage the view of worksheets and workbooks -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.