-
Developing a Safety Procedures Manual
$99.00This course helps you craft a usable manual for your workplace, or for whatever situation you require one. You will learn about safety procedures and safety procedures templates. Also, this course introduces you to how to organize the steps in a procedure and construct a flowchart. Brainstorming allows you to gather information and you will also look at guidelines for writing procedures and learn about communication aids. -
Public Speaking: Presentation Survival School
$139.99This course will teach you how to manage your thoughts, body language, nervousness, and speech patterns to present yourself professionally. You’ll also learn how to present at meetings, use the five-S pattern to prepare a good presentation, and punch up your presentation with visual aids. As a bonus, you’ll complete Velsoft’s signature personality assessment to help you identify your strengths and weaknesses as a speaker. -
Business Leadership: Becoming Management Material
$99.00The first part of this course will teach you about Peter Senge’s five learning disciplines: personal mastery, mental models, shared vision, team learning, and systems thinking. You will also learn about Paul Hersey and Ken Blanchard’s Situational Leadership II® model, servant leadership, and the five practices in James Kouzes and Barry Posner's “The Leadership Challenge.” In addition to these leadership models, basic skills (such as building trust, managing change, personal productivity, resolving conflict, solving problems, and leading meetings) will also be covered. -
Introduction to HTML and CSS Coding: Doing More with HTML
$99.00In this course you will learn how to add images in HTML, add links in HTML, and add tables in HTML. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.