-
Creating Successful Staff Retreats
$99.00In this course you are going to learn a comprehensive approach to crafting a successful staff retreat for your organization. You are going to look at why retreats are conducted, look at retreat undertaking categories and then advance to the development and presentation of retreat activities. Your retreat education doesn’t stop there as you are also going to learn how to identify the critical elements of a staff retreat and you will learn to create a planning checklist and about the keys of running a retreat. When the retreat is over, your responsibilities aren’t, you need to evaluate how things went so you will learn how to create an evaluation and follow up. -
Microsoft 365 Word: Part 3: Securing a Document
$99.00Suppress information Set editing restrictions Add a digital signature to a document Restrict document access -
Crisis Management
$139.99To begin this course, you will learn how to put the right people in place with a crisis management team and appropriate training. Then, you will learn how to identify and assess crisis risks, develop a response process, and gather appropriate resources. You will also learn how to respond to, document, and investigate crises; establish an emergency operations center; create a continuity plan; and recover from a crisis. -
E-Commerce Management
$99.00This course will give you the skills to develop, design, test and successfully run your e-commerce business. It looks at important components such as business plans and marketing while touching upon payment methods, software solutions, security and fraud awareness, and much more. With those topics covered you will have the skills to take your e-commerce business to the next level. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.