-
Performance Management: Managing Employee Performance
$99.00In this course, you will learn about the Shared Management Model, which helps the manager transfer motivation and responsibility for results to the employee. This course will cover all three phases of the model: preparing the employee for the job, motivating them to do it, and evaluating their performance. -
Microsoft 365 SharePoint: Adding and Configuring Libraries, Apps, Lists, and Pages
$99.00In this course you will learn how to: Configure document libraries, and Add libraries, apps, lists, and pages to your site. -
Introduction to HTML and CSS Coding Part 2: Performance and Organization
$99.00In this course you will learn about strategy and structure, object-oriented CSS, scalable and modular architecture for CSS, and reusable code. -
Windows 10: May 2019 Update: Windows Settings and Storage
$99.00In this course you will learn how to use the updated Settings app, and use the updated Storage settings. -
Getting Started with Microsoft 365: Managing Users
$99.00Get started as an administrator Manage users, groups, and resources in Microsoft 365 -
Diversity Training: Celebrating Diversity in the Workplace
$99.00In this course, you will learn what diversity means and what some of its related terms are. You’ll also consider how your world has changed and how stereotypes impact people. Then, you’ll learn how to use the four cornerstones of diversity and the STOP technique to encourage a diverse workplace. You will also learn how to manage for diversity and deal with discrimination issues. -
Developing a High Reliability Organization
$99.00You will learn what constitutes a High Reliability Organization (HRO), the principles behind high reliability and take a look at a real life disaster that could have benefitted from those principles. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.