-
Corrective Action
$99.00This course covers all the essential elements of corrective and preventive action, from identifying problems from customer complaints and internal audits and determining their significance through root cause analysis, to measuring the effectiveness of the action. -
Microsoft 365 OneNote: Online: Working with Notes, Part Two
$99.00In this course you will learn how to: use tags and symbols, add handwritten text to a note, and use OneNote’s highlighting tools. -
Microsoft Teams: Using Other Communication Tools
$99.00In this course you will learn how to use chat, and manage meetings and files. -
NLP Tools for Real Life
$139.99This course will teach you about anchoring, establishing congruency, developing rapport, creating outcomes, interpreting and presenting information efficiently, and self-hypnosis. -
Budgets and Managing Money
$99.00To start this course, you will review the fundamentals of finance (including basic terms, generally accepted accounting principles, and financial roles in an organization). Then, you will learn about different types of budgets and a six-step budgeting process. You will also learn how to monitor budgets, perform basic ratio analysis, and compare investment opportunities. -
Workplace Harassment: What It Is and What to Do About It
$99.00In this course, you will learn about different types of harassment. You will also learn prevention strategies (such as harassment policies and handling issues promptly), what to do if you are harassed, what to do if you are accused of harassment, and how to handle harassment as a manager. Then, you will learn a basic complaint resolution process (including how to handle false complaints), when mediation might be an option, and ways to help the workplace return to normal. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.