-
Code of Conduct: Setting the Tone for Your Workplace
$99.00Over the duration of this course, you will learn the whys and whats of a workplace code of conduct. You learn why they are needed, who they apply to, how to develop and implement one, and how to train employees on it. -
Microsoft 365 Excel: Online: Working with Data
$99.00In this course you will learn how to: use formulas and functions, work with data, rows, and columns, and sort and filter data. -
Human Resources Training: HR for the Non-HR Manager
$99.00This course will introduce you to basic human resource functions, including hiring, orientation, training, performance management, diversity, privacy, and disciplinary issues. -
Microsoft 365 Excel: Online: Formatting a Worksheet
$99.00In this course you will learn how to: format text and cells, align cell contents, use Find and Select tools, and apply conditional formatting. -
Microsoft 365 Excel: Part 2: Organizing Worksheet Data with Tables
$99.00Create and format tables Modify tables Use table references -
E-Commerce Management
$99.00This course will give you the skills to develop, design, test and successfully run your e-commerce business. It looks at important components such as business plans and marketing while touching upon payment methods, software solutions, security and fraud awareness, and much more. With those topics covered you will have the skills to take your e-commerce business to the next level. -
Vendor Management Essentials
$99.00This course will take you through a Vendor Management process including outlining a Vendor Policy Document, developing Vendor Key Performance Indicators, assessing of potential vendor risk, describing components of a vendor contract, and monitoring the performance and relationship of vendors using questionnaires, form and auditing. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.




































