-
Microsoft 365 Excel: Part 3: Worksheet Automation
$99.00Manage workbook properties Record, create and edit a macro Create and use a template Use data validation in a workbook -
Microsoft 365 Word: Part 3: Simplifying and Managing Long Documents
$99.00Add cover pages and blank pages to a document Insert an index Insert a table of contents Insert ancillary tables, such as tables of figures and authorities Manage document outlines Create master and subdocuments -
Developing a High Reliability Organization
$99.00You will learn what constitutes a High Reliability Organization (HRO), the principles behind high reliability and take a look at a real life disaster that could have benefitted from those principles. -
Knowledge Management
$99.00In this course, you will learn what knowledge is, what knowledge management is, how tacit and explicit knowledge are different, and the business benefits that knowledge management can bring. Then, you will learn about the knowledge management mix (which includes people, technology, and process) as well as a four step process for building your knowledge management framework. You will also learn about four knowledge management models: Bukowitz and Williams’ KM Process Framework, Gamble and Blackwell’s knowledge management matrix, Botha’s process model, and Nonaka and Takeuchi’s spiral model. Implementation aspects, such as knowledge management teams, post-mortem plans, KMBOKs, Chief Knowledge Officers, and pilot programs, are covered as well. -
Human Resources Training: HR for the Non-HR Manager
$99.00This course will introduce you to basic human resource functions, including hiring, orientation, training, performance management, diversity, privacy, and disciplinary issues. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.