-
Process Improvement with Gap Analysis
$99.00You will learn how to embrace Process Improvement with Gap Analysis during this course which provides you with the knowledge of what gap analysis is, examples, templates, and the guidance to implement an analysis in your situation. -
Building a Consulting Business
$99.00This course will guide you along your journey to starting your own consulting business. It will take a look at important components such as business plans and marketing plans while touching on networking and important documents you need to consider. -
Introduction to HTML and CSS Coding: Getting Started with HTML
$99.00In this course you will learn how to properly type HTML code, add basic elements, including headings, paragraphs, and breaks, and create a bulleted or numbered list. -
Planning for Workplace Safety
$99.00This course gives you the tools to create a workplace safety plan that covers the all the bases you need to begin to build a safe work environment. You will learn many topics including the basics of a safety policy along with the introduction of a safety plan and how to develop a communications plan. You will learn how to decide upon training solutions for common accidents/incidents and learn of the importance and structure of incident response plans. Also, the course covers 6S inspections, checklists, plus the value of an appendix for the safety plan. -
Introduction to Microsoft Power BI: Introduction to the Power BI Web App
$99.00In this course you will learn how to use the Power BI web app, connect to data sources from the Power BI app, and se workspaces, dashboards, reports, and other Power BI app features. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.