-
Diversity Training: Celebrating Diversity in the Workplace
$99.00In this course, you will learn what diversity means and what some of its related terms are. You’ll also consider how your world has changed and how stereotypes impact people. Then, you’ll learn how to use the four cornerstones of diversity and the STOP technique to encourage a diverse workplace. You will also learn how to manage for diversity and deal with discrimination issues. -
Microsoft 365 Excel: Part 2: Analyzing Data with Logical and Lookup Functions
$99.00Use text functions Use logical functions Use lookup functions Use date functions Use financial functions -
Microsoft 365 Excel: Part 1: Getting Started
$99.00Identify the basic components of Excel Create a basic worksheet Get help in Excel 365 -
Developing Your Training Program
$139.99You will start this course by considering what training is, when it is necessary, and what other options are out there. Then, you will learn the ICE method for identifying needs, a seven-step model for instructional design, and tips for building an engaging program. Next, you will walk through the steps of program design, including setting learning objectives, identifying evaluation strategies, choosing learning methodologies, finding content, creating energizers, using assessment tools, developing supporting materials, and testing the program. You will also receive tips on creating a proposal for a training program and building rapport with company sponsors. -
CRM: An Introduction to Customer Relationship Management
$99.00This course will teach you how to make a decision about the need for CRM, the benefits of CRM, and how to coordinate the base requirements for a CRM undertaking. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.