-
Business Succession Planning: Developing and Maintaining a Succession Plan
$139.99This course will teach you how to develop and maintain a succession plan with the SUCCESS model, which includes developing a system, identifying resources, creating risk assessments, developing action plans, implementing those plans, and evaluating the results. -
Microsoft 365 Excel: Part 3: Worksheet Automation
$99.00Manage workbook properties Record, create and edit a macro Create and use a template Use data validation in a workbook -
Workplace Ergonomics: Injury Prevention Through Ergonomics
$139.99In this course, you will learn how to identify, assess, and resolve ergonomic issues. You will also learn about basic ergonomic principles for sitting, standing, lifting, transporting items, and using tools. Ergonomic environments and workstations will also be covered. -
-
Microsoft 365 Outlook: Online: Using the Calendar Workspace
$99.00In this course you will learn how to: get started with the Calendar workspace, work with events, use the Event window, and use shared calendars. -
Growth Hacking
$99.00In this one-day course, you will learn how to: identify the growth hacking mindset, recognize the differences between growth hacking and marketing, identify the customer need your business can fill, create and implement product placement and services to fit the need, learn and practice techniques of growth hacking, review and practice growth marketing strategies, identify the essentials of conversion and optimization, and create your own growth hacking plan. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.