-
Microsoft 365 Word: Part 3: Adding Reference Marks and Notes
$99.00Add captions to objects Insert cross-references Add bookmarks and hyperlinks Insert footnotes and endnotes Add citations Insert a bibliography -
Business Process Management
$60.00To begin this course, you will learn about business process management and three related skill areas: business analysis, enterprise content management, and business process re-engineering. Then, you will work through the five stages of the business process life cycle: vision, design, modeling, execution, monitoring, and optimization. Tools such as automation, business rules, workflow engines, what-if analysis, process mining, business activity monitoring, the balanced scorecard, Lean, and Six Sigma are also covered. -
Cannabis and the Workplace
$65.00In this course, you are going to learn about cannabis, its effects on the individual, and the potential impact in the workplace. You will consider medical cannabis, the rights and obligations of employees and employers, and the intervention process as you deal proactively by having a comprehensive drug and alcohol policy. -
Training with Visual Storytelling
$99.00In this course, you will learn how to use storytelling to engage the hearts and minds of your audience. Well cover the essential elements of a successful story as well as a variety of storyboarding and graphic design tools. After you complete this course, youll be ready to create engaging, compelling training sessions that inspire your students. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.









































