-
Survival Skills for the New Trainer
$139.99In this course, you will learn the basic skills that every trainer must have. This includes dressing appropriately, being assertive, being genuine, communicating well, connecting with people, handling difficult participants, and a desire to learn. At the end of the course, you’ll review a list of do’s and don’ts and consider your next steps. -
Public Speaking: Speaking Under Pressure
$139.99This course will take you through preparing an effective presentation. Topics include planning your speech, identifying your audience, connecting with the listener, developing key themes and sentences, structuring your ideas, and managing nervousness and body language. You’ll focus on short responses and learn ways to expand a basic presentation. -
Introduction to HTML and CSS Coding: Doing More with HTML
$99.00In this course you will learn how to add images in HTML, add links in HTML, and add tables in HTML. -
Inventory Management: The Nuts and Bolts
$99.00In this course, you will learn about all aspects of inventory management, including common terms, the inventory cycle, how to maintain inventory accuracy, and what some of the latest trends are. -
Microsoft 365 Excel: Part 1: Working with Data
$99.00Use formulas and functions Work with data, rows, and columns Sort and filter data -
Negotiating for Results
$139.99In this course, you will learn about the different types of negotiation, characteristics of a successful negotiator, and building win-win solutions. You will also learn about the four phases of negotiation: preparation, exchanging information, bargaining, and closing. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































