-
Conference and Event Management
$139.99In this course, you will learn all the essentials of event planning, including setting objectives, budgeting, using committees, advertising, choosing a venue, selecting a menu, developing takeaway items, gathering feedback for the plan, hosting the event, and evaluating how it all went. -
Introduction to Microsoft Power BI: Getting Started
$99.00In this course you will learn how to describe the components of Power BI, work with Power BI files, connect to data sources with the Power BI desktop client, create a report and visualizations, and work with visualizations. -
Communication Strategies
$139.99This course will teach you all about the various aspects of communication. You’ll learn about asking questions, probing for information, active listening, and body language. Supporting skills are also covered, such as self-esteem, building relationships with others, and assertiveness. -
Workplace Harassment: What It Is and What to Do About It
$99.00In this course, you will learn about different types of harassment. You will also learn prevention strategies (such as harassment policies and handling issues promptly), what to do if you are harassed, what to do if you are accused of harassment, and how to handle harassment as a manager. Then, you will learn a basic complaint resolution process (including how to handle false complaints), when mediation might be an option, and ways to help the workplace return to normal. -
Process Improvement with Gap Analysis
$99.00You will learn how to embrace Process Improvement with Gap Analysis during this course which provides you with the knowledge of what gap analysis is, examples, templates, and the guidance to implement an analysis in your situation. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.