-
Time Management: Get Organized for Peak Performance
$139.99In this course, you will learn how to organize your workflow and office space, use your planner effectively, and delegate some of your work to other people. -
Vendor Management Essentials
$99.00This course will take you through a Vendor Management process including outlining a Vendor Policy Document, developing Vendor Key Performance Indicators, assessing of potential vendor risk, describing components of a vendor contract, and monitoring the performance and relationship of vendors using questionnaires, form and auditing. -
Research Skills
$139.99In this course, you will learn basic research skills, such as reading, memory recall, and note-taking. You will also learn how to create different kinds of outlines for different stages of your project, and how to move from the outline to writing, editing, and polishing. As well, you’ll learn how to find information using the library’s Dewey Decimal System, journals, and the Internet. -
Skills for the Administrative Assistant
$139.99In this course, you’ll learn about the elements of a professional attitude, including dressing appropriately, developing a positive outlook, being assertive, and communicating well. You’ll also learn some fundamental skills for administrative assistants, such as writing letters, managing your time, saying “no,” working with others, and dealing with stress. All of these tools will help you achieve your goals and help the people that you support achieve their goals, too. -
Business Succession Planning: Developing and Maintaining a Succession Plan
$139.99This course will teach you how to develop and maintain a succession plan with the SUCCESS model, which includes developing a system, identifying resources, creating risk assessments, developing action plans, implementing those plans, and evaluating the results. -
Developing Your Training Program
$139.99You will start this course by considering what training is, when it is necessary, and what other options are out there. Then, you will learn the ICE method for identifying needs, a seven-step model for instructional design, and tips for building an engaging program. Next, you will walk through the steps of program design, including setting learning objectives, identifying evaluation strategies, choosing learning methodologies, finding content, creating energizers, using assessment tools, developing supporting materials, and testing the program. You will also receive tips on creating a proposal for a training program and building rapport with company sponsors. -
Active Listening
$139.99In this course, you will learn what active listening is and what qualities active listeners have. You’ll also learn how to manage your body language, create a positive listening attitude, encourage conversation, build relationships, and get over listening roadblocks. -
-
Digital Citizenship: Conducting Yourself in a Digital World
$99.00You will be presented with the concept that, just as in the real world we have certain rights, responsibilities, and standards of behavior as citizens, this is true in the digital world as well. This will be supported by looking at the similarities between the two worlds. Your understanding of what digital citizenship entails will be increased by examining its three principles, each of which is comprised of three elements. You will be counselled on how to practice good citizenship using each of the elements. The course finishes up with giving you exercises designed to reinforce the principles. -
Microsoft 365 Word: Part 3: Adding Reference Marks and Notes
$99.00Add captions to objects Insert cross-references Add bookmarks and hyperlinks Insert footnotes and endnotes Add citations Insert a bibliography -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.