-
Cannabis and the Workplace
$99.00In this course, you are going to learn about cannabis, its effects on the individual, and the potential impact in the workplace. You will consider medical cannabis, the rights and obligations of employees and employers, and the intervention process as you deal proactively by having a comprehensive drug and alcohol policy. -
Getting Started with Microsoft 365: File Storage and Collaboration
$99.00Store files and collaborate with OneDrive for Business Manage an organization’s activity with Delve -
Advanced Skills for the Practical Trainer
$139.99To begin, you will explore the trainer’s role and what skills and competencies trainers should have. Then you will learn about the learning process and different learning styles, and apply that knowledge to designing programs and motivating learners. You will also learn ways to manage the stress of training, plan a workshop, and lead a training session. Then, you will learn techniques for dealing with difficult participants, evaluating learning, and conducting on-the-job follow-up. Alternative training methods, such as eLearning, co-facilitation, and team teaching will also be covered. -
The Professional Supervisor
$139.99In this course, you will learn how to plan effectively, build a high-performing team, motivate employees, provide effective feedback, delegate, and manage conflict. You will also receive an introduction to several leadership theories, including John Adair’s action-centered leadership model, Paul Hersey and Ken Blanchard’s Situational Leadership II® model, and Velsoft’s signature leadership assessment. -
Microsoft 365 Excel: Online: Organizing Worksheet Data with Tables and Charts
$99.00In this course you will learn how to create and modify tables and charts. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.