|IT & Technology||Analyzing Data With What-If Analysis in Excel 2010 (Spanish)||Course||More Info|
|IT & Technology||Analyzing Data With What-If Analysis in Excel 2010 (Spanish)||Course||
Analyzing Data With What-If Analysis in Excel 2010 (Spanish)
Excel 2010 provides powerful data-analysis tools that enable you to explore large amounts of data and to make educated business decisions based on that data. Using Goal Seek and Solver enables you to retrieve required results from formulas by determining the data the formula requires. And you can use additional what-if analysis components, data tables and scenarios, to forecast worksheet outcome models and to see how changing values in formulas affect the formula results.
|IT & Technology||Android Application Development: Working with the Emulator||Video||More Info||Launch|
|IT & Technology||Android Application Development: Working with the Emulator||Video||
Android Application Development: Working with the Emulator
|IT & Technology||AngularJS: Using the $anchorScroll Service||Video||More Info||Launch|
|IT & Technology||AngularJS: Using the $anchorScroll Service||Video||
AngularJS: Using the $anchorScroll Service
In AngularJS, you can use the $anchorScroll service in conjunction with hyperlinks in the markup to automatically scroll to other parts of a page. In this video, Wesley Miller demonstrates how to use the $anchorScroll service to scroll to hyperlinks at the top and bottom of a div container element on a web page.
|IT & Technology||Apple iPhone iOS 7: Personal Hotspot||Video||More Info||Launch|
|IT & Technology||Apple iPhone iOS 7: Personal Hotspot||Video||
Apple iPhone iOS 7: Personal Hotspot
The Personal Hotspot feature in iOS 7 allows you to use the cellular data connection on your Apple iPhone to connect your computer and other devices to the Internet. In this video, Bob Flisser demonstrates how to set up Personal Hotspot and share Internet connectivity with an iPad using Wi-Fi.
|Compliance||Awareness of End of Life Care: About End of Life Care||Course||More Info|
|Compliance||Awareness of End of Life Care: About End of Life Care||Course||
Awareness of End of Life Care: About End of Life Care
End of life care is a special form of care given to those who are nearing the end of their life. Palliative care workers should be capable of managing the physical symptoms associated with end of life. This course looks at the aims, principles and policies of end of life care and how these policies can be applied locally. It also examines the responsibilities involved in carrying out personal care after death and the five stages of bereavement.
|Govt Training Solutions||Barbara Byrne: Business Versus Government||Video||More Info||Launch|
|Govt Training Solutions||Barbara Byrne: Business Versus Government||Video||
Barbara Byrne: Business Versus Government
If you think big business is bad, how do you grow an economy? Government creates a platform - the rule of law, the rule of safety, etc. - but it does not create wealth. Small businesses create jobs and, if they are successful, become big businesses.
|Compliance||Bloodborne Pathogen Awareness||Course||More Info||Launch|
|Compliance||Bloodborne Pathogen Awareness||Course||
Bloodborne Pathogen Awareness
This course will provide you with a basic understanding of bloodborne pathogens, common modes of transmission, methods of prevention, and what to do if an exposure occurs. You'll learn how to identify bloodborne pathogens and symptoms of bloodborne diseases, identify modes of transition of bloodborne pathogens, recognize the proper use and handling of personal protective equipment, identify measures to be taken when the skin or eyes are exposed to infectious material, and specify the components of an Exposure Control Plan. Course material was developed with subject matter support from EnSafe Inc., a global professional services company focusing on engineering, environment, health and safety, and information technology.
|Management Training||Bob Chapman: The Most Important Leadership Question||Video||More Info||Launch|
|Management Training||Bob Chapman: The Most Important Leadership Question||Video||
Bob Chapman: The Most Important Leadership Question
In relocating a company from Boston to Akron, they started by telling people what to do. When that got them nowhere, a leader with no knowledge asked people engaged in the problem what to do, and empowered them to do it. That brought dramatic improvement.
|Books24x7||Books24x7 Tour||Tour||More Info||Launch|
An in-depth look at the Skillsoft Books24x7 platform, including available resources and navigational tips.
|Business||Career and Family Challenges for Women Leaders||Course||More Info||Launch|
|Business||Career and Family Challenges for Women Leaders||Course||
Career and Family Challenges for Women Leaders
Women face unique challenges in the workplace, including the difficulty in balancing work and family. Their experience in running both a family and a career also provides them with unique value and perspective. In this course, you'll learn how to conquer some of the challenges of career and family, including building a support system, overcoming the perfection mindset, and reframing your limiting beliefs.
|IT & Technology||Certified Ethical Hacker (CEH) v8: Hacking and Penetration Testing||Course||More Info||Launch|
|IT & Technology||Certified Ethical Hacker (CEH) v8: Hacking and Penetration Testing||Course||
Certified Ethical Hacker (CEH) v8: Hacking and Penetration Testing
Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. In this course we discuss hacking concepts, methods, and penetration testing. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the first in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
|IT & Technology||Cisco IINS 2.0: Introducing Networking Security Fundamentals||Course||More Info||Launch|
|IT & Technology||Cisco IINS 2.0: Introducing Networking Security Fundamentals||Course||
Cisco IINS 2.0: Introducing Networking Security Fundamentals
Risk management is a building block of effective security architectures, which protects organizational assets against constantly evolving threats. This course provides an explanation of the breadth of the challenge to establish and maintain a secure network environment. It includes a description of the fundamental concepts in Network Security, identifies common vulnerabilities and threats in borderless networks, and describes basic principles for securing networks against common threats.
|IT & Technology||Cisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting||Course||More Info|
|IT & Technology||Cisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting||Course||
Cisco SISAS 1.0: Endpoint Access Control Enhancements and Troubleshooting
The Cisco Identity Services Engine offers a range of advanced endpoint access control features. You can use them to enforce compliance and enhance infrastructure security. This course discusses the posture, profiler, and Bring Your Own Device (BYOD) solutions. In this course, you will learn about the posture assessment and the use of NAC agents. You will also learn about the Cisco ISE profiler and the endpoint identity groups as well as the BYOD solution elements and device onboarding.
|IT & Technology||CISM 2013: Information Security Governance (Part 1)||Course||More Info||Launch|
|IT & Technology||CISM 2013: Information Security Governance (Part 1)||Course||
CISM 2013: Information Security Governance (Part 1)
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core principles and metrics that are used at part of this process. This course prepares you for the Certified Information Security Manager (CISM) exam.
|IT & Technology||CISSP 2012 Domain: Cryptography||Course||More Info||Launch|
|IT & Technology||CISSP 2012 Domain: Cryptography||Course||
CISSP 2012 Domain: Cryptography
This course covers the invention of cryptography, the use of algorithms and ciphers, and the secure mechanisms used for message authentication and certificate authority. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
|IT & Technology||CISSP 2013 Domain: Business Continuity and Disaster Recovery Planning||Course||More Info||Launch|
|IT & Technology||CISSP 2013 Domain: Business Continuity and Disaster Recovery Planning||Course||
CISSP 2013 Domain: Business Continuity and Disaster Recovery Planning
Business continuity is an essential part of any enterprise. When a disaster occurs, it is imperative that a company be prepared, and has policies and people in place to step in and restore normal business operations. This course discusses the processes that are used to create a business continuity and disaster recovery plan and strategies for critical resource recovery. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC2) for its Certified Information Systems Security Professional (CISSP) certification. The CISSP credential certifies student expertise in ten different knowledge domains.
|IT & Technology||CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery||Course||More Info||Launch|
|IT & Technology||CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery||Course||
CompTIA CASP CAS-002: Privacy Policies & Procedures and Incident Recovery
Creating strong privacy polices and procedures will aid in securing organizational assets. If an event does occur, it is important to have proper procedures in place to make sure that recovery occurs as quickly and as efficiently as possible. In this course, you'll learn about the policies, procedures, and business documents that are used when creating a secure network environment. You will also examine the incident response and recovery procedures that are used when security breaches occur. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
|IT & Technology||CSS 3.0: ID and Class Selectors||Video||More Info||Launch|
|IT & Technology||CSS 3.0: ID and Class Selectors||Video||
CSS 3.0: ID and Class Selectors
In CSS there are several ways to isolate and select elements in the HTML for styling. In this video, Mark Lassoff will demonstrate how to use IDs and class selectors to do this.
|Compliance||Data Protection Awareness in the UK||Course||More Info|
|Compliance||Data Protection Awareness in the UK||Course||
Data Protection Awareness in the UK
This training programme is designed to increase your awareness and understanding of the obligations under the Data Protection Act 1998, and highlight how it affects the way organisations work. You might not realise it, but we all process personal data every day. This means that safeguarding the privacy and rights of people whose data we use is the responsibility of each and every one of us. This course was developed with subject matter support provided by Gordon Dadds LLP. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Gordon Dadds LLP accepts no responsibility for their contents and the reliance on the contents is prohibited and at the user's risk. Transmission of the information is not intended to create, and receipt does not constitute, a solicitor-client relationship. Readers should not act upon this information without seeking independent legal advice.
|IT & Technology||Defensive Coding for C#||Course||More Info|
|IT & Technology||Defensive Coding for C#||Course||
Defensive Coding for C#
Defensive Programming is a methodology for writing code that is not prone to present or future errors potentially caused by unexpected user inputs/actions. In this course you will explore common risks to C#, how to counter common risks, the best way to deal with user input, and finally how to secure WCF applications.
|Compliance||Defensive Driving Fundamentals||Course||More Info||Launch|
|Compliance||Defensive Driving Fundamentals||Course||
Defensive Driving Fundamentals
This course will provide advanced defensive driving techniques to reduce your chances of being involved in a motor vehicle accident. The content in this course is designed to comply with the intent of the applicable regulatory requirements - specify concerns to be addressed before and while driving, use safe driving techniques to avoid collisions, drive safely in various weather conditions, and respond to specific driving emergency situations.
|IT & Technology||Deminar||Live Learning Course||More Info||Launch|
|IT & Technology||Deminar||Live Learning Course||
An engaging, 8-minute recording delivered by two of our expert instructors that conveys the look and feel of the Live class experience.
|Leadership Development Skills||Dominic Barton: You Can't Lead Others Until You Lead Yourself||Video||More Info||Launch|
|Leadership Development Skills||Dominic Barton: You Can't Lead Others Until You Lead Yourself||Video||
Dominic Barton: You Can't Lead Others Until You Lead Yourself
It's hard to lead if you don't have a clear purpose, an ability to absorb shocks, and an ability to manage your energy, as opposed to managing your time.
|Compliance||Electrical Safety||Course||More Info||Launch|
This course from our EH&S collection, focuses on specific electrical hazards found in the workplace and methods to minimize or eliminate those hazards. The content in this course is designed to comply with the intent of the applicable regulatory requirements. Learner objectives are to: recall basic rules of electricity as they relate to electrical safety, identify actions to take in an electricity-related emergency, recognize common electrical hazards, and describe methods to reduce or eliminate electrical hazards. This course was developed with subject matter support provided by EnSafe Inc., a global professional services company focusing on engineering, environment, health and safety, and information technology.
|Business||Engaging Top Performers||Course||More Info||Launch|
|Business||Engaging Top Performers||Course||
Engaging Top Performers
How do you move your company to drive results and take a prominent place in the market? By engaging those employees who consistently bring high levels of performance and positively influence the culture of your organization. Managers and leaders need to recognize who their top performers are, how they're different from other employees, and how to ensure they maintain a deep connection with their work. In this course, you'll learn how to improve your workplace so that it both attracts and meets the needs of top performers and how to work with four communication styles, including the one typically used by top performers, to help you recognize and adjust your own style for more effective communication.
|Compliance||EU Antitrust||Course||More Info||Launch|
The European Union (EU) has established rules and policies to ensure competition enhances overall economic welfare. Two key rules, covered in Articles 101 and 102 of the Treaty on the Functioning of the EU, address anticompetitive agreements and the abuse of a dominant market position. This course explains the consequences of engaging in anti-competitive behavior and describes how to identify practices that infringe EU antitrust law. This course was developed with subject matter support provided by Davenport Lyons. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments.
|Compliance||Fire Safety and Prevention||Course||More Info||Launch|
|Compliance||Fire Safety and Prevention||Course||
Fire Safety and Prevention
Learn how to prevent fires and recognize fire hazards, what actions to take in the event of a fire and how to use portable fire extinguishers. This course, designed to comply with regulatory requirement intent, instructs learners on the chemistry of fire and teaches them how to recognize common fire hazards, classify types of fires and fire extinguishers, identify the general requirements of egress or exit standards. Course material was developed with subject matter support from EnSafe Inc., a global professional services company focusing on engineering, environment, health and safety, and information technology.
|Compliance||Food Allergy Awareness||Course||More Info|
|Compliance||Food Allergy Awareness||Course||
Food Allergy Awareness
It is estimated that approximately ten deaths each year occur in the UK due to a food allergy induced anaphylactic shock. Many people suffer various types of minor to severe reactions to food allergies. Eating out is considered the biggest risk for food allergy sufferers, and caterers or catering establishments that prepare, cook or serve non-prepacked (loose) or prepacked food, must adhere to the labelling regulations to enable customers to make informed choices. This course examines the types of reactions and symptoms suffered by those who experience food allergies, in addition to detailing the 14 regulated food allergens that cause these reactions. The course also looks at different dietary requirements and methods that can help reduce the risk of a person suffering an allergic reaction on your premises.
|Compliance||Foodservice Worker Safety||Course||More Info||Launch|
|Compliance||Foodservice Worker Safety||Course||
Foodservice Worker Safety
There are hazards in every workplace. For young and inexperienced workers, food preparation jobs in restaurants, cafeterias, hotels, or schools are often their first jobs. This course educates food service workers on the hazards they may be exposed to, including ergonomics, kitchen equipment, fire safety, machine guarding, slips, trips and falls, sharps, burns, and electrical safety and outlines best practices for avoiding these hazards.
|IT & Technology||Fundamental Methods for Data Science in R||Course||More Info||Launch|
|IT & Technology||Fundamental Methods for Data Science in R||Course||
Fundamental Methods for Data Science in R
R is a free software environment for statistical computing and graphics and has become an important tool in modern data science. In this course, you will learn the fundamental R methods that data scientists use in their everyday work.
|Executive Education||Gary Krahn: Building Cathedrals||Video||More Info||Launch|
|Executive Education||Gary Krahn: Building Cathedrals||Video||
Gary Krahn: Building Cathedrals
Good companies are focused on themselves. They know their own strengths and they operate in those strengths every day. There's nothing wrong with that, Gary Krahn says. But if you want to be a great company, you have to take it a step further.
|IT & Technology||Getting Started with AngularJS||Course||More Info||Launch|
|IT & Technology||Getting Started with AngularJS||Course||
Getting Started with AngularJS
AngularJS is designed to simplify the task of building single page Model, View, Controller apps. This course introduces the AngularJS environment, using controllers, and working with user input and formatted output.
|Compliance||Global IT Security Basics||Course||More Info||Launch|
|Compliance||Global IT Security Basics||Course||
Global IT Security Basics
Lax security practices and poor security awareness on the part of employees can result in security breaches that have serious consequences for organizations. Hackers will take advantage of any vulnerability, and their reach is global. This course focuses on common pitfalls in IT security by end users, highlighting how seemingly harmless actions by employees can give opportunistic hackers access to sensitive organizational data and systems. The course also provides employees with common sense guidelines dealing with areas such as mobile security, online security, password security, and malicious e-mails. Please note that the course content is for informational purposes only and does not constitute legal advice. Nothing in the course materials shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any jurisdiction's laws. Transmission of this information is not intended to create, and receipt does not establish, an attorney-client relationship. Users should not act upon this information without seeking professional counsel licensed in their jurisdiction.
|Compliance||Hazardous Materials in the Workplace||Course||More Info||Launch|
|Compliance||Hazardous Materials in the Workplace||Course||
Hazardous Materials in the Workplace
This course discusses proper handling of chemicals in the workplace and actions that can be taken to protect the workers, the public, and the environment. It also covers the roles and responsibilities of those responding to events involving hazardous materials. The content in this course is designed to comply with the intent of the applicable regulatory requirements.
|Compliance||Hazardous Waste Generator (RCRA) (Spanish)||Course||More Info|
|Compliance||Hazardous Waste Generator (RCRA) (Spanish)||Course||
Hazardous Waste Generator (RCRA) (Spanish)
This course provides basic information on hazardous waste determination and characterization and describes the three types of generator status (Conditionally Exempt Small Quantity Generator, Small Quantity Generator, and Large Quantity Generator) along with applicable requirements. The content in this course is designed to comply with the intent of the applicable regulatory requirements. Learner objectives for this course are to identify and characterize all wastes, properly label and manage waste containers, use a manifest when RCRA waste is transported, properly dispose of hazardous waste, prepare waste generation reports, and maintain compliance records.
|IT & Technology||i0S 9 iPhone First Look: 3D Touch on the iPhone 6s||Video||More Info||Launch|
|IT & Technology||i0S 9 iPhone First Look: 3D Touch on the iPhone 6s||Video||
i0S 9 iPhone First Look: 3D Touch on the iPhone 6s
After watching this video, you will be able to use the 3D Touch feature of the iPhone 6S with iOS 9.
|IT & Technology||ICND1.1 Session 2: Cisco LAN Switching||Live Learning Course||More Info||Launch|
|IT & Technology||ICND1.1 Session 2: Cisco LAN Switching||Live Learning Course||
ICND1.1 Session 2: Cisco LAN Switching
This Live Learning course covers topics related to Cisco LAN Switching, including understanding the challenges of shared LANs, solving network challenges with switched LAN Technology, exploring the packet delivery process, operating Cisco IOS Software and starting a switch.
|IT & Technology||ICND1 2.0: The Transport Layer and Router Configuration||Course||More Info||Launch|
|IT & Technology||ICND1 2.0: The Transport Layer and Router Configuration||Course||
ICND1 2.0: The Transport Layer and Router Configuration
Understanding how routers function will help you to understand the broader topic of how networks are connected and how data is transmitted over networks. This course describes the operation of routing. After hardware installation, when a Cisco router is turned on, it goes through its startup procedure. Once the operating system is loaded, you can start configuring the router. This course concludes by describing basic configurations, how to configure interfaces, and how to use Cisco Discovery Protocol to discover connected neighboring devices.
|IT & Technology||ICND2 2.0: VLANs and Spanning-Tree||Course||More Info||Launch|
|IT & Technology||ICND2 2.0: VLANs and Spanning-Tree||Course||
ICND2 2.0: VLANs and Spanning-Tree
This course starts with a review of VLAN and trunk technology. Understanding how VLANs and trunks operate and which protocols are associated with them is important for configuring, verifying, and troubleshooting VLANs and trunks on Cisco access switches. This course also addresses some of the common reasons that port connectivity, VLAN configuration, and trunk establishment can fail. It describes what information to look for to identify the source of the problem and determine how to solve it. Switched networks introduce redundancy, so an STP loop-avoidance mechanism is needed to prevent undesirable loops.
|IT & Technology||Implementing Cisco Data Center Unified Computing (DCUCI) v5.0 Expert Encore||Live Learning Course||More Info||Launch|
|IT & Technology||Implementing Cisco Data Center Unified Computing (DCUCI) v5.0 Expert Encore||Live Learning Course||
Implementing Cisco Data Center Unified Computing (DCUCI) v5.0 Expert Encore
The DCUCI course focuses on the installation and implementation of Cisco's Unified Computing System (UCS) B-Series Blade Servers and C-Series Rack-Mount Servers. Students learn how these servers can integrate with Local Area Network (LAN) and/or Storage Area Network (SAN) storage solutions. The course also includes a discussion of virtualization technologies, including the Cisco Nexus 1000V virtual switch.
|Compliance||Information Security - The Break-In||Module||More Info||Launch|
|Compliance||Information Security - The Break-In||Module||
Information Security - The Break-In
Given the global nature of commerce and the volume of electronic information routinely exchanged every day, data security has never been a more critical business issue. This Compliance Impact dramatizes how a simple act of carelessness can cause a serious data breach.
|Books24x7||inGenius Tour||Tour||More Info||Launch|
An in-depth look at the Skillsoft Books24x7 inGenius, including available resources and navigational tips.
|Business||Interpersonal Communication: Communicating with Confidence (Spanish)||Course||More Info||Launch|
|Business||Interpersonal Communication: Communicating with Confidence (Spanish)||Course||
Interpersonal Communication: Communicating with Confidence (Spanish)
The course shows you how the essential elements of trust, credibility, and specific confident communication behaviors bring about confident communication and enhance your influence. It highlights the advantages of communicating with confidence, explores the construction of trust and credibility, and clarifies how trust and credibility result in confident communications.
|Business||Interpersonal Communication that Builds Trust||Course||More Info||Launch|
|Business||Interpersonal Communication that Builds Trust||Course||
Interpersonal Communication that Builds Trust
Communication works best when your intention is clear, your audience is engaged, and your verbal and nonverbal behavior are respectful. When you hit these notes, you'll build trust with the people you communicate with. To maintain that trust, you also have to be aware of and manage emotions - yours and those of others. In this course, you'll explore how a clear intention drives a communication, and how understanding your audience ensures that the message gets delivered. You'll also learn how verbal signals, nonverbal behavior, and emotional intelligence can help make or break your communications.
|IT & Technology||IT & Desktop Performance Support Video Promo||Video||More Info||Launch|
|IT & Technology||IT & Desktop Performance Support Video Promo||Video||
IT & Desktop Performance Support Video Promo
These mobile-friendly videos enable organizations to address skill gaps in a timely manner, saving money and freeing up resources for innovative thinking. The new Skillsoft IT and Desktop Videos are short, 3-5 minutes in length, covering nearly 1,000 desktop and IT topics including Microsoft® Office and security.
|IT & Technology||IT Security||Video||More Info||Launch|
|IT & Technology||IT Security||Video||
|Compliance||IT Security - Safeguarding Your Mobile Devices||Course||More Info||Launch|
|Compliance||IT Security - Safeguarding Your Mobile Devices||Course||
IT Security - Safeguarding Your Mobile Devices
Mobile devices are a significant risk to an organization's network security. In this Compliance Expert Impact, Bill Baker explores steps companies can take to better insulate their networks from mobile intrusion.
|IT & Technology||Junior Level LPIC-1 Exam 101: Linux Package Management||Course||More Info||Launch|
|IT & Technology||Junior Level LPIC-1 Exam 101: Linux Package Management||Course||
Junior Level LPIC-1 Exam 101: Linux Package Management
Package management systems are used for installing, uninstalling, and upgrading software in Linux. This course describes the most common package management systems - dpkg, which is the system used with Debian packages, rpm used with Red Hat-based packages, and yum, adapted by Red Hat to deal with dependency issues. This course is part of a series that prepares the learner for CompTIA Linux+ exam LX0-101 and Linux Professional Institute (LPI) LPIC-1 Junior Level Administrator exam 101.
|Keeping Priorities in Focus||Video||More Info||Launch|
|Keeping Priorities in Focus||Video||
Keeping Priorities in Focus
Have you ever found yourself torn between one task and another? Learn to set priorities and keep focused – define your goals to avoid getting distracted, then make a plan to help you achieve them. Check progress against the plan and adjust as necessary to stay on track. Anyone can learn to plan by developing a few simple habits.
|Business||Lean Tools for Process Control in Six Sigma||Course||More Info||Launch|
|Business||Lean Tools for Process Control in Six Sigma||Course||
Lean Tools for Process Control in Six Sigma
In the final stages of a Six Sigma project, teams need to control the improved process in order to sustain the improvements. Process control involves applying tools to continuously monitor and maintain each improved process, and to prevent it from reverting to its previous state. Two tools from the Lean toolset specifically help here. Total Productive Maintenance (TPM) is a proactive equipment maintenance program that seeks to engage employees at all levels and functions in an organization to maximize the overall effectiveness of existing processes and equipment. In this course you'll learn how TPM can be used to control the improved process and maintain process gains.
|IT & Technology||Live Learning Demonstration||Live Learning Course||More Info||Launch|
|IT & Technology||Live Learning Demonstration||Live Learning Course||
Live Learning Demonstration
Expert-led classroom training is important to learners who want or need formal instructor-led training and all the benefits it provides. Skillsoft's Live Learning offers this experience in a virtual setting. Self-paced courses covering the same material from the same instructors are available to provide refresher training. Live Learning is primarily certification-focused and covers some of the most popular IT certifications as well as training for PMI certifications.
|Compliance||Machine Guarding Impact: Areas Where Mechanical Hazards Exist||Course||More Info||Launch|
|Compliance||Machine Guarding Impact: Areas Where Mechanical Hazards Exist||Course||
Machine Guarding Impact: Areas Where Mechanical Hazards Exist
When working with tools and machines, employees need to identify the areas of mechanical hazards and take adequate precautionary measures to ensure safety. In this Machine Guarding impact, you'll learn the various mechanical hazards that could result in severe physical injuries or death or both.
|IT & Technology||Managing Agile Software Development||Course||More Info||Launch|
|IT & Technology||Managing Agile Software Development||Course||
Managing Agile Software Development
In this course you will be introduced to the principles of agile project management during software development iterations. You will become familiar with agile practices in relation to project management tasks such as work scheduling, team meetings, change and risk management, progress monitoring, reports and reviews, and project scaling.
|Business||Managing Workforce Generations: Working with a Multigenerational Team (Spanish)||Course||More Info|
|Business||Managing Workforce Generations: Working with a Multigenerational Team (Spanish)||Course||
Managing Workforce Generations: Working with a Multigenerational Team (Spanish)
This course reviews the potential sources of conflict within a generationally diverse team, including differences in approaches to work and communication. It also covers strategies for managing a multigenerational team in a way that ensures your team members - regardless of differences in approach - feel included, respected, and supported. This course also describes how to implement a mentoring program that takes advantage of the varying experiences and perspectives of multiple generations.
|IT & Technology||Manipulating Data in Excel 2013||Course||More Info||Launch|
|IT & Technology||Manipulating Data in Excel 2013||Course||
Manipulating Data in Excel 2013
Excel 2013 provides multiple features for organizing and managing data, including sorting and filtering tools that are essential to data analysis. Using data organization features, you can sort, filter, and group and outline data so that you can focus on its key parts. Properly arranged data using the commands in the Data tab allows you to present your data in a logical and easy to understand manner. This course explores organizing data in Excel 2013 using the built-in features. It also covers converting text to columns for easy of splitting text. This course will help prepare learners for the Microsoft Certification Exam 77-420: Excel 2013 which certifies individuals as Microsoft Office Specialist (MOS): Excel 2013.
|Learning in Talent Mangement||Marcia W. Blenko: How Alan Mulally Builds Trust and Transparency: The Rainbow Story||Video||More Info||Launch|
|Learning in Talent Mangement||Marcia W. Blenko: How Alan Mulally Builds Trust and Transparency: The Rainbow Story||Video||
Marcia W. Blenko: How Alan Mulally Builds Trust and Transparency: The Rainbow Story
Marcia Blenko shares a story she termed "The Rainbow Story." Alan Mulally helped transform Ford Motor Company by rewarding leaders for their honesty, showing the importance of transparency, and building trust with your team.
|Business||Maximize Your Productivity by Managing Time and Tasks||Course||More Info||Launch|
|Business||Maximize Your Productivity by Managing Time and Tasks||Course||
Maximize Your Productivity by Managing Time and Tasks
The amount of time available to you is constant — you can't buy more and you can't save it for later. What you can do is increase your productivity — the value you produce in the time you have. And the better you understand your own personal productivity, the easier it will be to manage your time effectively. In this course, you'll learn about managing tasks in a way that maximizes your productivity. You'll discover the benefits of setting goals and how productivity is tied to your ability to assess time and set priorities. You'll learn about the process of "chunking" your time and the principles of efficient scheduling. You'll also learn about the different types of to-do lists and how to use them effectively.
|IT & Technology||Microsoft Exchange Server 2013 - Core Solutions: Deployment||Course||More Info||Launch|
|IT & Technology||Microsoft Exchange Server 2013 - Core Solutions: Deployment||Course||
Microsoft Exchange Server 2013 - Core Solutions: Deployment
Exchange Server 2013 is Microsoft's latest release of their popular messaging and communications server. A variety of features have been added or expanded upon with this release, most notably the consolidation of server roles. This courses discusses the Exchange prerequisites and network requirements for installing Exchange Server in your organization. Also, demonstrated is the installation of Exchange Server 2013 and the new Exchange Administration Center (EAC). This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Exchange Server 2013 exam 70-341 Core Solutions of Microsoft Exchange Server 2013. This exam is one of the requirements for the MCSE: Messaging certification path.
|IT & Technology||Microsoft Lync Server Management Shell: Validate the Configuration||Video||More Info||Launch|
|IT & Technology||Microsoft Lync Server Management Shell: Validate the Configuration||Video||
Microsoft Lync Server Management Shell: Validate the Configuration
|IT & Technology||Microsoft Security Fundamentals: Network Security||Course||More Info||Launch|
|IT & Technology||Microsoft Security Fundamentals: Network Security||Course||
Microsoft Security Fundamentals: Network Security
One of the building blocks of successful IT security practices is a fundamental understanding of network security. This course introduces key concepts about dedicated firewalls and methods including packet filtering, circuit-level, application-level, and stateful multilevel firewalls. This course also covers types of inspection, and stateful v. stateless inspection. Finally, this course covers best practices for Network Access Protection, network isolation methods, and protocol security concepts including common network attack methods. This course is one of a series in the Skillsoft learning path that covers the objectives for the Microsoft Security Fundamentals: MTA 98-367 exam.
|IT & Technology||Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites||Course||More Info||Launch|
|IT & Technology||Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites||Course||
Microsoft SharePoint Server 2013 - Developing Core Solutions: Planning Sites
Planning and designing Microsoft SharePoint Server 2013 sites involves creating and managing content, provisioning sites, and managing site lifecycles. This course covers the activities involved in creating content types, managing content behaviors, provisioning, and maintaining sites throughout their lifecycle. This course is part of a series of Skillsoft courses that cover the objectives for exam 70-488. This exam is required for the certification Microsoft Certified Solutions Developer (MCSD): SharePoint Applications.
|IT & Technology||Microsoft SQL Server 2012: Querying Basics and Modifying Data||Course||More Info||Launch|
|IT & Technology||Microsoft SQL Server 2012: Querying Basics and Modifying Data||Course||
Microsoft SQL Server 2012: Querying Basics and Modifying Data
This course also demonstrates how to use joins in queries in combine data from multiple tables and how to use subqueries. This course is one of a series in the Skillsoft learning path that covers the objectives for the exam 70-461: Microsoft SQL Server 2012: Querying. This exam is one of the requirements for the Microsoft Certified Solutions Associated (MCSA): SQL Server 2012 certification.
|IT & Technology||Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration||Course||More Info|
|IT & Technology||Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration||Course||
Microsoft SQL Server 2014 - Designing BI Solutions: SharePoint Integration
The primary goal of a Business Intelligence solution is the delivery of meaningful data to the business users to make informed decisions required for the business. SharePoint and Reporting Services can provide a collaboration and report delivery system for the business users. SharePoint provides Excel services along with PowerPivot and Power View to create meaningful reports which can be delivered through various means. In this course, you will learn how to integrate SharePoint with Reporting Services, including PowerPivot and Power View. You will also explore the various methods for processing and delivering reports to business users. This course is one of a series in the Skillsoft learning path that helps individuals prepare for the Designing Business Intelligence Solutions with Microsoft SQL Server exam (70-467).
|IT & Technology||Microsoft Systems Center||Video||More Info||Launch|
|IT & Technology||Microsoft Systems Center||Video||
Microsoft Systems Center
|IT & Technology||Microsoft Visio: Simplifying Organization Chart Creation||Video||More Info||Launch|
|IT & Technology||Microsoft Visio: Simplifying Organization Chart Creation||Video||
Microsoft Visio: Simplifying Organization Chart Creation
|IT & Technology||Microsoft Windows 8 - Configuring: Getting Started with Windows 8||Course||More Info||Launch|
|IT & Technology||Microsoft Windows 8 - Configuring: Getting Started with Windows 8||Course||
Microsoft Windows 8 - Configuring: Getting Started with Windows 8
This course provides an overview of the various Windows 8 installation components including WIM images, the setup executable, the Windows Preinstallation Environment (WinPE), the boot environment, and answer files. You can perform a basic clean install on a new system, but Windows 8 can also be installed to an existing computer as a dual boot – either using another partition or by installing Windows 8 to a Virtual Hard Disk (VHD) or native VHD/VHDX boot. This course applies to objectives of the 70-687: Configuring Windows 8 exam of the MCSA: Windows 8 designation.
|IT & Technology||Microsoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V Server||Course||More Info||Launch|
|IT & Technology||Microsoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V Server||Course||
Microsoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V Server
Virtual Hard Disk, or VHDs are the basic unit of Hyper-V virtualization and they can be implemented in various ways. Hyper-V Manager is the main administrative interface for small and medium installations of Hyper-V, and this course takes you through the basic management tasks you can carry out. Resource Monitor, Performance Monitor, Task Manager, Reliability Monitor and SCVMM can all be used to optimize the host server and VMs in a Hyper-V system and this course reviews each.
|IT & Technology||Microsoft Word for Mac 2011||Course||More Info||Launch|
|IT & Technology||Microsoft Word for Mac 2011||Course||
Microsoft Word for Mac 2011
Word for Mac 2011 is the newest version of Microsoft's word processing tool for the Mac platform. It offers a streamlined interface and features that allow you to create attractive and engaging documents. The ribbon, which is unique to Microsoft Office, organizes Word's many features into related tabs and makes it easier to quickly access those you need. And if you don't want to start your document with a blank white page, you can easily choose from a variety of templates using the Word Document Gallery. This course explores these topics and many other basics of using Word 2011, including opening the application, creating new documents, opening documents, basic text editing, and an introduction to the many tools that will help you create and edit your documents.
|IT & Technology||Navigating, Lists, Libraries, Alerts, and Document Sets in SharePoint 2013||Course||More Info||Launch|
|IT & Technology||Navigating, Lists, Libraries, Alerts, and Document Sets in SharePoint 2013||Course||
Navigating, Lists, Libraries, Alerts, and Document Sets in SharePoint 2013
This course covers how to navigate within the SharePoint 2013 interface using the Quick Launch and top link bar, as well as the Settings menu and the Newsfeed, SkyDrive, and Sites tabs. It also explores list and library management, including adding new items, adjusting item properties, and removing items. It demonstrates how to set alerts on list and libraries, as well as how to set an alert on search query results. Creating and adding files to document sets is also covered. This course will help prepare learners for the Microsoft Certification Exam 77-425: SharePoint 2013 which certifies individuals as Microsoft Office Specialist (MOS): SharePoint 2013.
|IT & Technology||Office 365: Working with Online Files and Calendars||Course||More Info||Launch|
|IT & Technology||Office 365: Working with Online Files and Calendars||Course||
Office 365: Working with Online Files and Calendars
Microsoft Office 365 includes hosted Exchange for meetings and shared calendars, and SharePoint. This course covers scheduling meetings and sharing calendars, creating announcements on SharePoint, chatting using Lync IM, and working with Office document files.
|IT & Technology||Oracle Database 11g Release 2: Database Architecture and Recovery Operations||Course||More Info||Launch|
|IT & Technology||Oracle Database 11g Release 2: Database Architecture and Recovery Operations||Course||
Oracle Database 11g Release 2: Database Architecture and Recovery Operations
This course reviews the major architectural components of the Oracle Database 11g architecture, such as memory structures, background processes, and the logical and physical storage structures. This course also discusses how to prepare an Oracle Database 11g database for recovery and backup using RMAN, ARCHIVELOG mode, retention policies, and a Flash Recovery Area. This course is one of a series in the SkillSoft learning path that covers the objectives for the Oracle Database 11g: Administration II (1Z0-053) exam.
|IT & Technology||Oracle Database 12c: Managing Security||Course||More Info||Launch|
|IT & Technology||Oracle Database 12c: Managing Security||Course||
Oracle Database 12c: Managing Security
Oracle Database 12c has provided some new security features to better enable security within a database instance. This includes unified auditing to consolidate all audit trails and to improve auditing performance, new administrative privileges and the ability to analyze privileges on users. It also provide a feature called Oracle Data Redaction, which enables sensitive data to be shielded from applications and users on-the-fly before results are sent to the end-user or application. This course will discuss and explain how to use and implement these features in Oracle Database 12c. This course is one in a series in the Skillsoft learning path that covers the objectives for the 1Z0-060: Upgrade to Oracle Database 12c certification exam.
|Business||Overcoming Your Own Unconscious Biases||Course||More Info||Launch|
|Business||Overcoming Your Own Unconscious Biases||Course||
Overcoming Your Own Unconscious Biases
Part of understanding the role of unconscious bias in the workplace is admitting to yourself that you have biases too. Once you've accepted it, you can take steps to overcome those biases and embrace workplace diversity. In this course, you'll learn how to recognize and observe your own biases. You'll also learn how to stop, collaborate, and move past your biases. Finally, you'll learn what to do if a bias flares up again.
|Percipio Demo||Video||More Info||Launch|
Check out the future of learning content delivery.
|IT & Technology||Planning and Monitoring Iterations on an Agile Project||Course||More Info||Launch|
|IT & Technology||Planning and Monitoring Iterations on an Agile Project||Course||
Planning and Monitoring Iterations on an Agile Project
This course focuses on the activities performed during the planning and execution of a project iteration, or sprint. During release planning - the previous phase in the overall agile planning process - the team creates an ordered list of project features in the form of the product backlog. Iteration planning is the process of creating an iteration (sprint) backlog that contains more specific detail regarding work items that have been assigned to the upcoming iteration. The first part of the course provides a look at the iteration planning process and the creation of the iteration backlog. It also explores how to create a schedule and use principles of buffering. The second section of the course covers key tools and methods used by agile teams to monitor and report project progress, both at the iteration level and at the overall project or release level. This course is intended for project managers, program managers, or anyone who wants to efficiently participate in agile projects. It is aligned with the Agile Certified Practitioner exam objectives developed by the Project Management Institute® and Certified ScrumMaster learning objectives.
|PMBOK: Outputs of Monitor and Control Project Work Process||Video||More Info||Launch|
|PMBOK: Outputs of Monitor and Control Project Work Process||Video||
PMBOK: Outputs of Monitor and Control Project Work Process
While you monitor and control project work you often have to suggest changes to get things back on track or prevent future problems. If approved, they can impact a project's plan, so updates to the scope, schedule and cost baselines are one output of the Monitor and Control Project Work Process. Learn about the three other outputs: change requests, work performance reports and project management plan updates.
|IT & Technology||PMP 5th Edition Encore Session 3: Time Planning||Live Learning Course||More Info||Launch|
|IT & Technology||PMP 5th Edition Encore Session 3: Time Planning||Live Learning Course||
PMP 5th Edition Encore Session 3: Time Planning
This course provides Project Managers with the knowledge and skills needed to master the PMBOK® Guide Fifth Edition and attain the Project Management Professional (PMP®) certification. The PMP® credential is the most widely accepted project certification in the world and the framework on which it is based has set the standard for the project management profession for over 25 years. This course is intended to enhance a student's project experience with global terminology and the proven framework for leading and directing project teams and in delivering project results within the constraints of schedule, budget and resources. The Project Management Institute has modified the previous body of knowledge to consist of forty-seven project processes within five process groups and ten knowledge areas. This course will cover these processes in a logical, sequential, and effective way to quickly and effectively prepare learners for the PMP Certification Exam.
|IT & Technology||PMP Encore Session 4: Project Cost Management and Project Quality Management||Live Learning Course||More Info||Launch|
|IT & Technology||PMP Encore Session 4: Project Cost Management and Project Quality Management||Live Learning Course||
PMP Encore Session 4: Project Cost Management and Project Quality Management
This course is intended to enhance a your project experience with global terminology and the proven framework for leading and directing project teams and in delivering project results within the constraints of schedule, budget and resources.
|IT & Technology||Preparing and Packaging Applications For Deployment||Course||More Info||Launch|
|IT & Technology||Preparing and Packaging Applications For Deployment||Course||
Preparing and Packaging Applications For Deployment
This course covers the key aspects of and approaches to packaging .NET applications for deployment and is one of a series that prepares students for Microsoft exam 70-487.
|IT & Technology||Python: Retrieving Form Data||Video||More Info||Launch|
|IT & Technology||Python: Retrieving Form Data||Video||
Python: Retrieving Form Data
Python allows you to retrieve form data. In this video, Mark Lassoff demonstrates how to get the field storage value and get the individual values from the form.
|IT & Technology||Python Fundamentals: Implement an Iterable Using __getItem__||Video||More Info||Launch|
|IT & Technology||Python Fundamentals: Implement an Iterable Using __getItem__||Video||
Python Fundamentals: Implement an Iterable Using __getItem__
After watching this video, you will be able to implement an iterable using consecutive integer indexing in Python.
|IT & Technology||Reviewing Documents in Word 2010 (Spanish)||Course||More Info|
|IT & Technology||Reviewing Documents in Word 2010 (Spanish)||Course||
Reviewing Documents in Word 2010 (Spanish)
This course explores all of the proofing features, from spelling and grammar correction to tracking changes. The course also demonstrates how to use the Help feature in Word 2010.
|Succession Planning||Robert Kaplan: Succession Planning||Video||More Info||Launch|
|Succession Planning||Robert Kaplan: Succession Planning||Video||
Robert Kaplan: Succession Planning
Companies complain that their biggest problem is lack of talent. To avoid that problem create a depth chart of successors and develop them actively through coaching and delegation. You will learn more about your people and identify holes that need filling.
|IT & Technology||SharePoint 2013||Video||More Info||Launch|
|IT & Technology||SharePoint 2013||Video||
|Learning Management Systems||Skillport Tour||Video Demo||More Info||Launch|
|Learning Management Systems||Skillport Tour||Video Demo||
|Business||Skillsoft Leadership Advantage||Learning Portal Tour||More Info||Launch|
|Business||Skillsoft Leadership Advantage||Learning Portal Tour||
Skillsoft Leadership Advantage
Skillsoft Leadership Advantage is a leading-edge leadership skills training and development program solution designed by experts to make learning quick and engaging. From first-time and front-line managers to managers in the executive suite, Skillsoft Leadership Advantage delivers learning solutions at every level in two hours or less, for easy integration into busy work schedules.
|Business||Skillsoft Leadership Advantage Tour - German||Learning Portal Tour||More Info||Launch|
|Business||Skillsoft Leadership Advantage Tour - German||Learning Portal Tour||
Skillsoft Leadership Advantage Tour - German
|Leadership||Skillsoft Leadership Channel - Darren Cassidy: How to Get Better As a Leader||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Darren Cassidy: How to Get Better As a Leader||Video||
Skillsoft Leadership Channel - Darren Cassidy: How to Get Better As a Leader
Take responsibility for your own development. There are many opportunities to learn in his company, including e-learning, experiential learning, mentoring, formal classes, etc. We should also listen to and seek help from people we work with. That's hugely valuable.
|Leadership||Skillsoft Leadership Channel - Joanna Barsh: Don't Be Frustrated; Be Curious||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Joanna Barsh: Don't Be Frustrated; Be Curious||Video||
Skillsoft Leadership Channel - Joanna Barsh: Don't Be Frustrated; Be Curious
When the group is not going where you want it to go, don't get frustrated. Be curious. Ask why. Sometimes you need to tell people what to do, but most of the time you will be more effective asking questions and learning. The group has more experience than you do.
|Leadership||Skillsoft Leadership Channel - Jonas Ridderstrale: Engaging and Reenergizing your Team: Investing in Psychological Capital||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Jonas Ridderstrale: Engaging and Reenergizing your Team: Investing in Psychological Capital||Video||
Skillsoft Leadership Channel - Jonas Ridderstrale: Engaging and Reenergizing your Team: Investing in Psychological Capital
To truly engage employees, you must tap into their emotional side in addition to their intellect. Intellectual capability is associated with only 28% of high performance; psychological factors explain more. Confidence, for example, explains 38%. Add hope, optimism, and resiliency and it becomes clear that psychological capital is as important as intellectual capital. The best employees possess not only high skill but also high will: skill + will. A different leadership style is needed to energize both skill and will. Pamper your employees as you do your customers.
|Leadership||Skillsoft Leadership Channel - Kelly Thompson: Leadership Is About Serving Your People||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Kelly Thompson: Leadership Is About Serving Your People||Video||
Skillsoft Leadership Channel - Kelly Thompson: Leadership Is About Serving Your People
No matter how much great advice you give, what people remember and respond to is how you treat them.
|Leadership||Skillsoft Leadership Channel - Lynda Gratton: Raising Performance and Collaboration in Virtual Teams||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Lynda Gratton: Raising Performance and Collaboration in Virtual Teams||Video||
Skillsoft Leadership Channel - Lynda Gratton: Raising Performance and Collaboration in Virtual Teams
What it takes to be successful in a team that is co-located is not the same as what it takes to be successful in a virtual team. Virtual teams are more likely to be motivated and energized if they have a great task that pulls the team together. Second, after a virtual team has worked together for a while, relationships begin to break down. To counter this, face-to-face or video-enabled meetings should be scheduled from time to time, to pull the team together.
|Leadership||Skillsoft Leadership Channel - Mike Jossi: Advice for New Managers||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Mike Jossi: Advice for New Managers||Video||
Skillsoft Leadership Channel - Mike Jossi: Advice for New Managers
New managers face a huge task in leading their team and overcoming myriad challenges. Mike Jossi shares what has worked well for him over the years in his management positions.
|Leadership||Skillsoft Leadership Channel - Renee Mauborgne: Tips on Developing a Blue Ocean Strategy||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Renee Mauborgne: Tips on Developing a Blue Ocean Strategy||Video||
Skillsoft Leadership Channel - Renee Mauborgne: Tips on Developing a Blue Ocean Strategy
Identify factors you compete on compared with buyer value, compared with the competition. Then identify customers who occasionally use, refuse to use, and never use. What factors should be eliminated or created to attract those customers and lower costs?
|Leadership||Skillsoft Leadership Channel - Robert Kaplan: On Becoming A Great Leader: Ask the Right Questions||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Robert Kaplan: On Becoming A Great Leader: Ask the Right Questions||Video||
Skillsoft Leadership Channel - Robert Kaplan: On Becoming A Great Leader: Ask the Right Questions
Leadership is not about having answers. To go from a good leader to a great leader, frame the right questions. If you're struggling, ask, "What's the right question?" not "What's the right answer?" Thinking about the right question helps reveal the solution.
|Leadership||Skillsoft Leadership Channel - Sally Shankland: Do You Want to Be Liked or Respected?||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Sally Shankland: Do You Want to Be Liked or Respected?||Video||
Skillsoft Leadership Channel - Sally Shankland: Do You Want to Be Liked or Respected?
Leaders cannot always be both liked and respected, so choose carefully.
|Leadership||Skillsoft Leadership Channel - Tammy Erickson: Managing Generation X||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Tammy Erickson: Managing Generation X||Video||
Skillsoft Leadership Channel - Tammy Erickson: Managing Generation X
Gen Xers are people in their 30's and 40's. They make good leaders because they tend to think about options; they keep doors open. They are also excellent parents, which helps them balance personal commitments with work priorities.
|Leadership||Skillsoft Leadership Channel - Vineet Nayer: The Power of I Don't Know||Video||More Info||Launch|
|Leadership||Skillsoft Leadership Channel - Vineet Nayer: The Power of I Don't Know||Video||
Skillsoft Leadership Channel - Vineet Nayer: The Power of I Don't Know
On becoming the new CEO, he was asked, in front of 5,000 employees, "What are you going to do?" He answered, "I don't know. You know. You tell me." This transferred ownership to the employees. The job of the CEO is to enable employee performance.
|Business||Skillsoft Professional Advantage Tour||Learning Portal Tour||More Info||Launch|
|Business||Skillsoft Professional Advantage Tour||Learning Portal Tour||
Skillsoft Professional Advantage Tour
Skillsoft Professional Advantage is a targeted professional development program focusing on key, essential competencies for non-managerial business professionals in the workplace. Recognizing that today's learners are busier than ever, each learning track provides choices for accessing the right amount of learning, in the right mode, for that moment in time. The multiple modes of instruction, including text, video, and interactive activities, keep the learning quick, easy, and engaging.
|Business||Skillsoft Professional Foundations Knowledge Center Tour||Learning Portal Tour||More Info||Launch|
|Business||Skillsoft Professional Foundations Knowledge Center Tour||Learning Portal Tour||
Skillsoft Professional Foundations Knowledge Center Tour
|Business||Skillsoft Sales Advantage Tour||Learning Portal Tour||More Info||Launch|
|Business||Skillsoft Sales Advantage Tour||Learning Portal Tour||
Skillsoft Sales Advantage Tour
Skillsoft Sales Advantage is aimed at experienced sales professionals selling into corporate and technical environments involving complex, extended sales cycles and consultative relationships. Recognizing that sales people are busier than ever, each learning track provides choices for accessing the right learning, in the right mode, at the right time. Flexibility is built in. You access learning your way... The multiple modes of instruction, including text, video, and interactive activities, ensure the learning is quick, easy, and engaging.
|Authoring Tools||SkillStudio Product Demo||Product Tour||More Info||Launch|
|Authoring Tools||SkillStudio Product Demo||Product Tour||
SkillStudio Product Demo
SkillStudio Product Demo
|Compliance||Social Media-Blogger Gone Bad||Module||More Info||Launch|
|Compliance||Social Media-Blogger Gone Bad||Module||
Social Media-Blogger Gone Bad
Using social media can be risky, especially when employees and colleagues are speaking about your organization. or competitors. This Compliance Impact explores a situation where an employee uses social media inappropriately in a way that is both unethical and in violation of her company's social media policy.
|IT & Technology||Social Networking for Users||Course||More Info||Launch|
|IT & Technology||Social Networking for Users||Course||
Social Networking for Users
This course will focus on using social networking services in a business context, and will include a discussion on the services available, instruction on using services in a professional manner, and a discussion of potential issues arising from social networking usage in the workplace.
|HRIS||SumTotal elixHR||Video Demo||More Info||Launch|
|HRIS||SumTotal elixHR||Video Demo||
Check out SumTotal's elixHR® platform, enabling one comprehensive view of your people regardless of the disparity of your core HR data.
|Learning Management Systems||SumTotal Learn||Video Demo||More Info|
|Learning Management Systems||SumTotal Learn||Video Demo||
SumTotal Learn is one of the industry's most complete learning solutions, with the flexibility to enable world-class formal training and certification programs, as well as day-to-day informal learning and knowledge sharing. All coming together in the most effective and engaging learning ecosystem - designed to increase your competitiveness, align with partners, educate your customers, and help employees be better at what they do.
|Learning Management Systems||SumTotal Maestro||Video Demo||More Info|
|Learning Management Systems||SumTotal Maestro||Video Demo||
SumTotal Maestro's intuitive, results driven interface is easy to implement, manage and administer. And just because it's designed for small and mid-size businesses doesn't mean it's the "light version." Many enterprise-class organizations across the globe find Maestro to be the perfect fit to meet the needs of their employees and business.
|Talent Management Systems||SumTotal Talent||Video Demo||More Info|
|Talent Management Systems||SumTotal Talent||Video Demo||
An organization's people are its biggest competitive advantage - however, programs designed to increase employee engagement and productivity often don't produce the desired results. Research shows this is typically due to lack of visibility into employees' capabilities and performance or HR having to spend too much time gathering and analyzing information across multiple systems instead of taking action that could have a material impact on the business.
|Workforce Management||SumTotal Talent Expansion® - Work Solutions||Video Demo||More Info||Launch|
|Workforce Management||SumTotal Talent Expansion® - Work Solutions||Video Demo||
SumTotal Talent Expansion® - Work Solutions
How can you turn your detached workforce processes into a proactive workforce strategy? Having the right people in the right place at the right time is only part of the solution. Launch this short demo to learn more.
|Business||Supply Chain Management Basics: Cutting Costs and Optimizing Delivery||Course||More Info||Launch|
|Business||Supply Chain Management Basics: Cutting Costs and Optimizing Delivery||Course||
Supply Chain Management Basics: Cutting Costs and Optimizing Delivery
Supply chain management, which is an integral part of operations management, is essential for both manufacturing and service organizations. It involves coordinating all the operations involved in designing, making, and delivering products or services to customers in order to manage costs and meet customer demands as efficiently as possible. In the course, you'll learn about the main components of a supply chain, the key objectives and drivers of supply chain management, and the characteristics of supply chain management in service organizations. You'll also learn how to select and combine appropriate supply chain management strategies, and how to measure their efficiency by considering certain key performance areas.
|Business||TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.||Course||More Info|
|Business||TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.||Course||
TestPrep Certified Associate in Project Management (CAPM) PMBOK Guide 5th Ed.
To test your knowledge on the skills and competencies being measured by the vendor certification exam. TestPrep can be taken in either Study or Certification mode. Study mode is designed to maximize learning by not only testing your knowledge of the material, but also by providing additional information on the topics presented. Certification mode is designed to test your knowledge of the material within a structured testing environment, providing valuable feedback at the end of the test.
|Compliance||The Bribery Act 2010||Course||More Info|
|Compliance||The Bribery Act 2010||Course||
The Bribery Act 2010
This course will help you gain an understanding of the UK Bribery Act of 2010. You'll learn about the types of activities and situations that constitute bribery under the law, as well as the penalties that can be levied against individuals who are convicted of offences under the law. This course was developed with subject matter support provided by Gordon Dadds LLP. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Gordon Dadds LLP accepts no responsibility for their contents and the reliance on the contents is prohibited and at the user's risk. Transmission of the information is not intended to create, and receipt does not constitute, a solicitor-client relationship. Readers should not act upon this information without seeking independent legal advice.
|Compliance||The High Cost of Low Ethics (Compliance LDC)||Video||More Info||Launch|
|Compliance||The High Cost of Low Ethics (Compliance LDC)||Video||
The High Cost of Low Ethics (Compliance LDC)
Unethical behavior affects 1) prestige; a lost reputation can alienate customers, shareholders, and prospective employees; 2) productivity, especially of highly skilled workers; and 3) profitability, through employee fraud, litigation, and high absenteeism.
|Compliance||The Internet, Social Media, and Electronic Communication||Course||More Info||Launch|
|Compliance||The Internet, Social Media, and Electronic Communication||Course||
The Internet, Social Media, and Electronic Communication
This course provides background information to be considered in light of your own company's policies on Internet use and electronic communications. You will learn about some generally accepted best practices for protecting your own and your company's best interests while using e-mail, instant messaging, text messaging, as well as other Internet technologies such as social networking sites and blogs.
|The Two Kinds of Power||Video||More Info||Launch|
|The Two Kinds of Power||Video||
The Two Kinds of Power
Positional power is power directly related to your position; the power to direct people to complete tasks or make quick decisions. Personal power, on the other hand, is power you earn by obtaining the respect of others. Watch Seth and Ashley to see how the two kinds of power come into play.
|Performance Management||Tom Gardner: High Performers Need More Feedback||Video||More Info||Launch|
|Performance Management||Tom Gardner: High Performers Need More Feedback||Video||
Tom Gardner: High Performers Need More Feedback
High performers are paid more than low performers. They should also receive more non-monetary rewards, especially feedback, because they are motivated more by challenges, by a purpose, and by working with A-players than by money.
|Business||Too Much to Do and Too Little Time||Course||More Info||Launch|
|Business||Too Much to Do and Too Little Time||Course||
Too Much to Do and Too Little Time
Do you sometimes feel you have too much to do and not enough time to do it in? You aren't alone. It can be frustrating when you're expending a lot of energy but not sure you're doing it in the right places for the right reasons. Having goals is a good start. But do your goals align with your organization's goals for you? When goals shift and change and you don't know which are most important and to what degree you're supposed to be attending to them, it can get confusing. You have to be clear on where you're headed and why, otherwise your work getting there will be scattered and you won't make the best use of your time. In this course, you'll learn how to get clarity around what's most important - your goals - by ensuring they're aligned with those of your organization, so you can prioritize your work based on those goals.
|Compliance||UK Asbestos Awareness / Asbestos||Course||More Info|
|Compliance||UK Asbestos Awareness / Asbestos||Course||
UK Asbestos Awareness / Asbestos
Asbestos is responsible for around 5,000 deaths every year in the UK. These deaths are the result of repeated exposure to very high levels of airborne asbestos fibres during installation and industrial processes associated with asbestos products. Asbestos products were banned in 1999 and it's illegal to use asbestos-containing materials (ACMs) in construction or renovation work. However, ACMs are still present in many buildings that were constructed or refurbished before 2000. This course offers awareness-level training to help you avoid work that may disturb asbestos and cause an accidental release of its dangerous fibres. The course meets the requirements of Regulation 10 of the Control of Asbestos Regulations 2012 and HSE document L143. Specifically, the course explains what asbestos is, how it can affect your health, how it was typically used, potential locations of asbestos and ACMs in buildings, general emergency procedures for asbestos risks and how to minimise the risk of disturbing asbestos at work. This course was developed with subject matter support provided by Chilworth (a DEKRA Company) – Global Experts in Safety and Process Safety.
|Compliance||UK Working at Height||Course||More Info|
|Compliance||UK Working at Height||Course||
UK Working at Height
Working at height is an essential part of many jobs, but it can be dangerous. In fact, falls are the single biggest cause of workplace death and one of the main causes of serious injury. The Work at Height Regulations 2005 apply to all workplaces and industry sectors where work at height will be taking place. The regulations specify safe work practices and are designed to prevent deaths and injuries resulting from falls at work. The purpose of the legislation is to ensure that work at height is planned, organised and carried out safely. The regulations lay out responsibilities for employees and place duties on employers, the self-employed and any person who controls the work of others, to do all that is reasonably practicable to prevent falls in the workplace. In this course you will become aware of the duties and requirements of the Work at Height Regulations 2005. Learner objectives are to understand the meaning and purpose of the Working at Height Regulations, to recognise the basic responsibilities of employees who work at height and to understand the requirements and responsibilities of employers and other dutyholders involved with work at height.
|Business||Using Competitive Selling Skills||Module||More Info||Launch|
|Business||Using Competitive Selling Skills||Module||
Using Competitive Selling Skills
To be ready to sell, you must be ready to compete. That means thinking about competitors-who they are, what they're offering, and how they win customers. Once you've done this, you must communicate your competitive insight effectively to the customer. This Challenge Series demo explores how you can draw on your knowledge of the competition to create and communicate a winning sales approach in scenarios where you play the role of an account executive for a coffee company.
|Business||Using Emotional Intelligence on the Job||Course||More Info||Launch|
|Business||Using Emotional Intelligence on the Job||Course||
Using Emotional Intelligence on the Job
In this course, you'll learn the value of emotions and how they can affect your workplace for better or for worse. You'll gain an understanding of how emotional forces can influence performance and decision making, learn how you can leverage emotions in a way that maximizes performance, and discover how you can shape your own and others' emotions in positive and mutually satisfying ways. The course will focus on using of empathy, particularly in confrontation scenarios, and on helping others to develop their own emotional self-awareness and empathy, leading to more positive exchanges on the job.
|IT & Technology||Visual Studio 2012: Deploying with Install Shield||Video||More Info||Launch|
|IT & Technology||Visual Studio 2012: Deploying with Install Shield||Video||
Visual Studio 2012: Deploying with Install Shield
|IT & Technology||VmWare Encore Session 3: vCenter Servicer and ESXi Host Management||Live Learning Course||More Info||Launch|
|IT & Technology||VmWare Encore Session 3: vCenter Servicer and ESXi Host Management||Live Learning Course||
VmWare Encore Session 3: vCenter Servicer and ESXi Host Management
This course provides instruction in the use of the following hardware/software technologies: VMware vSphere 5 Enterprise Plus, ESXi version 5, vCenter server standard, vSphere client and the vCenter web interface, virtual machine management, virtual networking introduction and virtual storage introduction.
|Compliance||Welding Impact: PPE Requirements||Course||More Info||Launch|
|Compliance||Welding Impact: PPE Requirements||Course||
Welding Impact: PPE Requirements
While performing hazardous operations such as welding, cutting, and brazing, personal protective equipment, or PPE, should be used, especially if engineering controls are not feasible. In this Welding impact, Rick Faletti describes some of the PPE equipment that can be used and their requirements.
|IT & Technology||Windows 8 Encore Session 1 Installing, Upgrading, Migrating to Windows 8||Live Learning Course||More Info||Launch|
|IT & Technology||Windows 8 Encore Session 1 Installing, Upgrading, Migrating to Windows 8||Live Learning Course||
Windows 8 Encore Session 1 Installing, Upgrading, Migrating to Windows 8
This course is designed to provide an in-depth understanding of the Microsoft Windows 8 operating system. The course covers such topics as installation, migration, Window 8 style applications, user and group accounts, security, networking, client virtualization, and advanced configuration. The course is designed to help IT professionals understand and support the technologies within Microsoft Windows 8.
|Compliance||Workplace Harassment for Employees||Course||More Info||Launch|
|Compliance||Workplace Harassment for Employees||Course||
Workplace Harassment for Employees
Harassment at work can have a corrosive effect on an organization's culture and can lead to low employee morale, reduced productivity, and even criminal liability. Focusing on the forms of harassment prohibited by federal law, this course will provide an overview of the types of behaviors that can give rise to harassment claims, including those based on gender, race, color, national origin, religion, age, and disability. It will also discuss the benefits of and strategies for promoting a respectful work environment that is free of all forms of harassment, intimidation, and discrimination.
|Compliance||WSET Great Grapes of the World||Course||More Info|
|Compliance||WSET Great Grapes of the World||Course||
WSET Great Grapes of the World
Have you ever been at a loss as to what wine to choose at a restaurant? Would you know your Pinot Noir from your Pinot Grigio? Beginning with a complete overview of the world of wine, this course will take you through the characteristics of major grape varieties from around the world and give you a thorough understanding of the main styles of wines. The course will explain wine-making techniques, the fermentation process and all the factors that influence how a wine looks, smells and tastes. You will be able to access aids and instructions to help you taste wine like a professional and discover how to sample a grape in order to isolate flavour characteristics such as tannin and sweetness. After studying the section on food, you will be able to match different styles of wine successfully to various types of cuisine, from salty cheeses to rich desserts. In the section dedicated to grapes, you will be given detailed descriptions of the major black and white grape varieties grown around the world. These include black grapes – Cabernet, Merlot, Shiraz, Pinot Noir, Gamay, Grenache, Sangiovese, Tempranillo and Nebbiolo – and white grapes – Chardonnay, Sauvignon Blanc, Riesling, Chenin Blanc, Gewürztraminer, Pinot Grigio, Viognier and Sémillon. Moving through each grape profile, links and interactivity are provided to further complement your knowledge of major wine-producing regions. You will also find helpful tips on specific food matches for each wine style, key blending partners, useful wine comparisons and suggestions for the most suitable wines to try in order to taste and experience the characteristics of each grape variety for yourself.