-
Project Planning: All You Need to Know
$65.00Once you complete this course you will have learned several valuable new skills that will allow you to properly plan for a project. You will come away from this course knowing about project management basics and how to being project planning. You will learn about the Work Breakdown Structure, how to prepare a basic schedule and all about Resource Breakdown Structures. You will conclude this course by learning about project planning worksheets. -
Developing a Training Needs Analysis
$99.00This course covers all the essential elements of a training needs analysis. The first step is using the ICE method to isolate problems, consult with stakeholders, and evaluate your options. Then, you can bring all of the information together into a training needs analysis that will convince readers to take action. -
Microsoft 365 Excel: Part 2: Enhancing Workbooks
$99.00Customize workbooks Manage themes Protect files Prepare a workbook for audiences -
Microsoft 365 Excel: Part 3: Worksheet Automation
$99.00Manage workbook properties Record, create and edit a macro Create and use a template Use data validation in a workbook -
Getting Your Job Search Started
$99.00In this course, you will learn how to manage change, identify your values and skills, consider your vocation, find jobs, network, and set goals. Then, you should be ready to start the search for your dream job. -
Ergonomics 101: Injury Prevention Through Workplace Ergonomics
$50.00In this course, you will learn how to identify, assess, and resolve ergonomic issues. You will also learn about basic ergonomic principles for sitting, standing, lifting, transporting items, and using tools. Ergonomic environments and workstations will also be covered. -
Cybersecurity 1: Fundamentals for Employees
$99.00Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.