• Growth Hacking

    In this one-day course, you will learn how to: identify the growth hacking mindset, recognize the differences between growth hacking and marketing, identify the customer need your business can fill, create and implement product placement and services to fit the need, learn and practice techniques of growth hacking, review and practice growth marketing strategies, identify the essentials of conversion and optimization, and create your own growth hacking plan.
  • Being a Team Player

    Teamwork is essential in any organization, and strongly influences whether a venture succeeds or fails. Participants will learn what characteristics are common to team players, how to demonstrate to others that you are a good team player, types of teams and which ones are vital to every workplace, reasons teams fail, and strategies to ensure success. Other courses that may be of interest are Creating a Positive Work Environment, Making Your Business Better, Problem Solving and Decision Making, Team Building- Developing High Performance Teams, and Communication Strategies.
  • From Boss to Leader

    After completing this course, participants will know the characteristics of bad bosses and good leaders, understand how those who hold management positions can develop into good leaders, know the elements of leading by example, understand the importance of good communication and effective feedback, and know how to use emotional intelligence.
  • Becoming a Progressive Employer: Setting Trends Instead of Following Them

    In this course, you will gain an understanding of what being progressive means, and then take time to truly examine this concept through activities and discussion. You will look at the process involved in going from the status quo to being progressive, along with how to develop or enhance a progressive mindset and innovative ideas. The last part of the course involves understanding the importance of a succession plan to a progressive organization.
  • Six Sigma: Entering the Dojo – Project Management in eSport

    Course Length: 4 Weeks Course Hours: 8 ________________________________________________________________________ Course Overview Once you complete Six Sigma: Entering the Dojo your skills in this practice area of business improvement will be prepped and practiced enough to apply them in the real world. You are going to learn about the basics of Six Sigma and about various improvement tools. You will follow that up with a look at management tools for generating ideas. A look at continuous improvement is next on the agenda and the course concludes with a consideration of customer relationships.
  • Identifying and Combatting Fake News

    After you complete this course you will be able to: define fake news, recognize the difference between fake news and objective reporting, understand the impacts of fake news on your organization, examine proactive strategies and how they work, learn reactive strategies and why they are essential, discover opportunities for promotion and growth within fake news , and create your own fake news action plan.
  • Promoting a Marketing Webinar

    At the end of this course, you will be able to define the marketing objectives of your webinar, create an attendee avatar to connect with your target audience, create and use a lead magnet, develop a promotion strategy, explore the potential of a joint venture, and create a webinar marketing calendar.
  • GDPR Readiness: Getting the Message Out

    In this one-day course, you will learn: about internal communication methods, about privacy training, and promoting a good privacy culture,about the elements of a good customer privacy policy, how to write and design a cookie banner disclaimer for your website, and how to design a privacy-compliant web form.
  • Cybersecurity 1: Fundamentals for Employees

    Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.