-
Microsoft 365 Word: Part 3: Collaborating on Documents
$99.00Modify user information in a document Share a document Work with comments Compare document changes Review a document with tracked changes Merge document changes Coauthor documents -
Creating Successful Staff Retreats
$99.00In this course you are going to learn a comprehensive approach to crafting a successful staff retreat for your organization. You are going to look at why retreats are conducted, look at retreat undertaking categories and then advance to the development and presentation of retreat activities. Your retreat education doesnt stop there as you are also going to learn how to identify the critical elements of a staff retreat and you will learn to create a planning checklist and about the keys of running a retreat. When the retreat is over, your responsibilities arent, you need to evaluate how things went so you will learn how to create an evaluation and follow up. -
Balanced Scorecard Basics
$70.00At the end of this course, you will be able to: Define what the balanced scorecard is, Identify the benefits of the scorecard, Create a vision statement for the balanced scorecard, Understand what corporate values, mission statements, and vision statements are and how they tie into the balanced scorecard process, Determine if the balanced scorecard is right for your organization, Describe the key elements of the balanced scorecard process, Identify a strategy map, tactical action plan, and balanced scorecard, Identify the components of supporting balanced scorecard plans, Understand what processes you will need to support the balanced scorecard, and Identify the members of different balanced scorecard teams. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.
