-
Intermediate Project Management
$65.00In this course, you will focus on the last three stages of the project life cycle: planning, execution, and termination. This includes identifying tasks and resources; using scheduling techniques like the work breakdown structure, Gantt charts, and network diagrams; preparing a budget; executing a project; and controlling changes. -
Conflict Resolution: Getting Along In The Workplace
$65.00In this course, you will learn what conflict is all about. You will also learn about different types of conflict, stages of conflict, helping others through conflict, and creating win/win solutions. As a bonus, you will also learn supporting skills, such as communication, active listening, and body language. -
Crisis Management
$70.00To begin this course, you will learn how to put the right people in place with a crisis management team and appropriate training. Then, you will learn how to identify and assess crisis risks, develop a response process, and gather appropriate resources. You will also learn how to respond to, document, and investigate crises; establish an emergency operations center; create a continuity plan; and recover from a crisis. -
Conference and Event Management
$75.00After you complete this course, you will be able to: Plan a complete corporate event, including an agenda, budget, and goals, Keep your event on budget, Select an appropriate venue, Design a promotional plan, Determine whether partners, sponsors, and volunteers can help to make your event unforgettable, Select speakers and a master of ceremonies to add impact to your event, Engage your event participants, and Evaluate the process once it is all wrapped up. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.









































