-
Business Etiquette: Gaining That Extra Edge
$139.99In this course, you’ll learn all about business etiquette. First, you will learn tips for meeting new people, which includes a good handshake, knowing how to handle business cards, making small talk, remembering names, and crafting a good first impression. Then, you’ll learn how to dress for success, dine with confidence, and present yourself well on the phone and via e-mail. -
Collaboration
$99.00After completion of this course, you should understand the definition of collaboration, what it takes to work collaboratively with your colleagues and the advantages of collaboration. Obstacles to collaboration will be explored, and how to develop strategies to improve a collaborative work environment. As well, you will know the six steps to make collaboration work, and the difference between collaboration, cooperation and teamwork. -
The Professional Supervisor
$139.99In this course, you will learn how to plan effectively, build a high-performing team, motivate employees, provide effective feedback, delegate, and manage conflict. You will also receive an introduction to several leadership theories, including John Adair’s action-centered leadership model, Paul Hersey and Ken Blanchard’s Situational Leadership II® model, and Velsoft’s signature leadership assessment. -
Building a Brand on Social Media
$99.00In this course you will look at various social media platforms and how they can be melded into your business to promote your brand. Along the way you will learn how to decide who your audience is, how to handle negative feedback as well as how to develop a complete social media plan. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.