Skip to content

Active Shooter 2.0

This training discusses typical characteristics of active shooter incidents, ways you can prepare now, and how best to react when an attack is in progress. You'll also learn what to expect and how to react when law enforcement arrives.

View

Becoming a DEI Ally and Agent for Change

In this course, you'll explore strategies to help you become an advocate for diversity, equity, and inclusion within the workplace. Topics include allyship, inclusive communication, the RISE model, and staying aware of your perspective.

View
Case Study Leavitt Group cover

Behavior-based Safety for Supervisors

This training provides supervisors with an overview of the concepts of behavior-based safety. This training will aid those supervisors who have not used these techniques in their day-to-day duties and responsibilities in the past.

View

Being a Fair and Caring Manager

This training explains how to demonstrate fairness in your communication, decision making, and personal skills such as listening, sharing, and showing concern to your direct reports.

View

Compliance Expert - Privacy and Information Security - Examples

Depending on the context, personal information may need to be protected for confidentiality. Organizations with access to this information need to understand how and when to protect privacy. This course will present some examples from the trenches.

View
clock

Compliance Expert: Diversity – Its Value in the Workplace

Diversity has a direct impact on corporate success. This Compliance Expert Impact explores the value of diversity in the workplace.

View
back-injury-prevention

Compliance Expert: Diversity – Overcoming Barriers

Barriers to diversity can exist at every level in an organization. This Compliance Expert Impact explores where employers must take steps to remove barriers and promote diversity.

View

COMPLIANCE EXPERT: IT Security - Phishing

Phishing is a fraudulent attempt to access personal financial account information or a corporate network. This training will explore common forms of phishing attempts.

View

COMPLIANCE EXPERT: IT Security - Safeguarding Mobile Devices

Mobile devices are a significant risk to an organization's network security. This training explores steps companies can take to better insulate their networks from mobile intrusion.

View

COMPLIANCE EXPERT: Privacy & Information Security - The Basics

This training explains how to protect personal information for confidentiality. Organizations with access to this information need to understand how to judge what and when to protect privacy.

View

Compliance Impact: Information Security – The Break-In

This training dramatizes how a simple act of carelessness can cause a serious data breach.

View

Compliance Impact: Social Media - Blogger Gone Bad

This training explores a situation where an employee uses social media inappropriately – in a way that is both unethical and in violation of her company's social media policy.

View
Back To Top