WHATSAPP BUSINESS CHATS ADVANCED

WhatsApp is one of the top two messaging apps in the world, used in 187 countries and by 1.5 billion people. Thus, it is a natural business progression to tap on this huge userbase of WhatsApp. This course offers the know-how to do exactly that.

You will learn how to use WhatsApp Business app to conduct your business with WhatsApp users. Discover how to use the unique business tools available only on this app to communicate and manage your customers. Create a business profile and use quick replies and label features to quickly respond and manage to your users. Find out how to send permission-based marketing messages without any cost and how to integrate WhatsApp to your website.

COURSE CONTENT

1.WHATSAPP BUSINESS BRANDING

        • WHY IS BRANDING SO IMPORTANT.
        • YOUR LOGO
        • COMPANY INFORMATION
        • ARE YOU OPEN FOR BUSINESS?
        • SPLIT BUSINESS FROM PERSONAL
        • WHAT IS WHATSAPP STATUS?
        • HOW TO USE WHATSAPP STATUS?
        • WHATSAPP STATUS IDEAS
        • ADDITIONAL WHATSAPP TOOLS

2.WHATSAPP AUTO REPLIES

        • WHY AUTO MESSAGES?
        • SETTING UP THE AUTO-REPLY FEATURE
        • BEST PRACTICES FOR AUTO-REPLIES
        • USING SPECIAL CHARACTERS
        • USING QUICK REPLIES
        • HOW TO CREATE QUICK REPLIES

3.WHATSAPP CHATS

        • HOW WHATSAPP BUSINESS CAN BE USED.
        • CHAT RULES
        • CHAT CONTENT
        • CLOSING THE CHAT.
        • QUICK CHATS
        • WEBHOOKS
        • READ STATUS DISABLED
        • CONVERT WHATSAPP INTO A DIARY OR A NOTEPAD
        • READ MESSAGES WITHOUT GOING ONLINE OR CHANGING LAST SEEN
        • CHECK THE NAME OF UNKNOWN NUMBERS

FINANCIAL FOR NON-FINANCIAL MANAGERS

Improve your understanding of financial management and how to use financial statements to improve your decision making. 

Decisions employees make daily in business often have a notable impact on the organisation's financial standing.

However, many people do not understand the importance of assessing how their decisions impact the organisation's bottom-line. Not being able to interpret financial statements fuels this lack of understanding.

COURSE CONTENT

1. INTRODUCTION INTO FINANCIAL FOR NON-FINANCIALS.

      • WHY FINANCIALS?
      • THE WORLDS ECONOMY.

2. UNDERSTANDING BASIC FINANCIAL TERMS.

      • UNDERSTANDING BASIC FINANCIAL TERMS.

3. FINANCIAL RATIO.

        • FINANCIAL RATIO.
        • A RATIONAL NUMBER.
        • FORMAL DEFINITION OF RATIONAL NUMBERS.
        • BASIC FINANCIAL RATIOS CALCULATIONS.

      4. BASIC FINANCIAL REPORTS.

            • BASIC FINANCIAL REPORTS.
            • BALANCE SHEETS.
            • INCOME STATEMENTS. (P&L – Profit & Loss)
            • STATEMENT OF OWNER’S EQUITY.
            • CASH FLOW STATEMENT.

            5. BUSINESS PLANS.

                  • BUSINESS PLANS.
                  • DO YOU NEED A BUSINESS PLAN?
                  • DESCRIBING YOUR BUSINESS.
                  • COMPOSING YOU EXECUTIVE SUMMARY.
                  • MARKETING AND SALES.
                  • ORGANISATIONAL AND OPERATING PLAN.
                  • YOUR FINANCIAL PLAN.
                  • PRESENTING YOUR PLAN.

                        6. BUDGETING.

                              • BUDGETING.
                              • BUDGETS AND BUSINESS PLANNING.
                              • BENIFITS OF A BUSINESS BUDGET.
                              • CREATING A BUDGET.
                              • CONCLUSION.

                              7. UNDERSTANDING INFLATION.

                                    • UNDERSTANDING INFLATION.
                                    • THERE ARE SEVERAL VARIATIONS ON INFLATION.
                                    • HOW INFLATION IS DETERMINED?

                                8. INVOICE, TAX & VAT.

                                      • INVOICES.
                                      • VAT, TAX INVOICES.

                                9. FINANCIAL DECISION MAKING.

                                      • FINANCIAL DECISION MAKING.

                                ANTI-MONEY LAUNDERING

                                This Anti- Money Laundering  and Counter Financing of Terrorism course seeks to equip participants with knowledge pertaining to regulatory and structural requirements needed to comply with Anti-Money Laundering/Counter Financing of Terrorism requirements.

                                COURSE CONTENT

                                1. INTRODUCTION TO MONEY LAUNDERING

                                  • MONEY LAUNDERING HISTORY
                                  • KEY TAKEAWAYS
                                  • MONEY LAUNDERING A MASSIVE PROBLEM
                                  • REGULATION REQUIREMENTS

                                2. ANTI-MONEY LAUNDERING LEGISLATION AND REGULATORY FRAMEWORK

                                  • INTRODUCTION
                                  • UNITED NATION CONVENTIONS
                                  • ANTI-MONEY LAUNDERING LEGISLATION IN THE UK

                                3. ANTI-MONEY LAUNDERING ORGANISATIONS RESPONSIBILITIES

                                  • INTRODUCTION
                                  • COMMON TERMINOLOGY USED
                                  • COMPANY COMPLIANCE
                                  • REPORTING OFFICER
                                  • EMPLOYEE SCREENING
                                  • EMPLOYEE RESPONSIBILITIES
                                  • ANTI-LAUNDERING POLICIES

                                4. ANTI-MONEY LAUNDERING RISK BASED APPROACH

                                  • COMMON TERMINOLOGY USED
                                  • TYPES OF BUSINESS TO BE IDENTIFIED
                                  • YOUR CUSTOMERS
                                  • LOCATION
                                  • SECTOR
                                  • DEVELOPING A RISK BASED APPROACH

                                5. CUSTOMER DUE DILIGENCE

                                  • INTRODUCTION
                                  • COMMON TERMINOLOGY USED
                                  • CUSTOMER DUE DILIGENCE
                                  • SITUATIONS TO APPLY TO
                                  • CUSTOMER IDENTIFICATION OF BENEFICIAL OWNERS
                                  • CUSTOMER DUE DILIGENCE MEASURES
                                  • ENHANCED DUE DILIGENCE (E.D.D.)
                                  • SIMPLIFIED DUE DILIGENCE (S.D.D.)
                                  • POLITICALLY EXPOSED PERSONS (P.E.P.)
                                  • RECORD KEEPING
                                  • HIGH RISK COUNTRIES

                                6. RECORD KEEPING

                                  • INTRODUCTION
                                  • COMMON TERMINOLOGY USED
                                  • DUE DILIGENCE RECORDS
                                  • SUSPICIOUS ACTIVITY REPORTS (S.A.R.)
                                  • TRAINING RECORDS AND AWARENESS
                                  • GENERAL RECORDS OF INTERNAL A.M.L. CONTROLS
                                  • USE OF ELECTRONIC DATA
                                  • DELETION OF PERSONAL DATA

                                7. IDENTIFYING AND REPORTING SUSPICIOUS ACTIVITY

                                  • IDENTIFYING SUSPICIOUS ACTIVITY
                                  • SUSPICIOUS ACTIVITY REPORTING
                                  • INCLUDED IN EXTERNAL SAR
                                  • CONFIDENTIALITY
                                  • CONSENT NEEDED
                                  • BUSINESS OPERATION AFTER SUBMISSION OF SAR
                                  • REPORTING SUSPICIOUS ACTIVITY
                                  • WHISTLE-BLOWING

                                8. STAFF TRAINING

                                  • RELEVANT BUSINESS
                                  • TRAINING PROGRAMS
                                  • TRAINING REQUIREMENTS
                                  • NOMINATED OFFICER
                                  • WHEN TO TRAIN
                                  • WHEN SHOULD TRAINING BE COMPLETED?
                                  • CPD TRAINING

                                SAFETY REPRESENTATIVE TRAINING COURSE

                                The Health and Safety Representative Course is the ideal way to ensure that your occupation health representative fully understand their objectives and statutory requirements. Every representative in this field has rights, powers, functions and duties that must be understood and implemented.

                                This course ensures efficiency and understanding of duties and obligations for this position. Attendees will have a greater understanding of SHE requirements and responsibilities according to the OHS Act. Implementing and monitoring various legislative procedures that promote and manage SHE related incidents, is also taught. Attendees will learn skills to identify.

                                COURSE CONTENT.

                                1.ABOUT EMPLOYMENT EQUITY.
                                2. EMPLOYMENT EQUITY STRATEGY.
                                3. CODES OF GOOD PRACTICE.
                                4. AFFIRMATIVE ACTION.
                                5. BLACK ECONOMIC EMPOWERMENT.
                                6. DISCRIMINATION.
                                7. RECRUITMENT AND SELECTION PROCESS.
                                8. EMPLOYMENT EQUITY COMMITTEE / FORUM.
                                9. EMPLOYMENT EQUITY PLAN.
                                10. EMPLOYMENT EQUITY REPORT.
                                11. COMMUNICATION DURING MEETINGS.


                                LAY COUNSELLING

                                This is a generic skills programme for learners in a variety of counselling contexts where clients are enabled to go through the process of finding solutions to their concerns or difficulties. It is intended for learners who counsel people in a variety of situations, but who are not registered professionals such as qualified psychologist and social workers. It will be useful for counsellors in a variety of counselling contexts including, but not limited to, schools, Non-Governmental Organisations, Faith Based Organisations, the South African Police Service, Counselling Call Centres, Hospitals, Clinics and Support Agencies, Sports Centres, Education and Training facilities, Government and Health and Social Services facilities. It should develop learners who know their scope of practice, behave ethically in a counselling context, conform to minimum standards and know when to refer a client.

                                COURSE CONTENT

                                1. FUNCTIONS AND LIMITS OF THE COUNSELLOR.
                                2. COUNSELLING ENVIRONMENT
                                3. PRINCIPALS AND PROCESSES
                                4. ATTITUDES AND BEHAVIOUR.
                                5. APPLY COUNSELLING
                                6. REFLECTION ON COUNSELLING.


                                EMPLOYMENT EQUITY COMMITTEE

                                Employment Equity Committee Training is essential if you want to avoid your company being fined up to 10% of your annual turnover for not complying with the Employment Equity Act. This training programme enables managers and consultation forums to work together effectively to ensure a constructive business transformation process. 

                                COURSE CONTENT

                                1.ABOUT EMPLOYMENT EQUITY.
                                2. EMPLOYMENT EQUITY STRATEGY.
                                3. CODES OF GOOD PRACTICE.
                                4. AFFIRMATIVE ACTION.
                                5. BLACK ECONOMIC EMPOWERMENT.
                                6. DISCRIMINATION.
                                7. RECRUITMENT AND SELECTION PROCESS.
                                8. EMPLOYMENT EQUITY COMMITTEE / FORUM.
                                9. EMPLOYMENT EQUITY PLAN.
                                10. EMPLOYMENT EQUITY REPORT.
                                11. COMMUNICATION DURING MEETINGS.

                                EMAIL CYBER SECURITY: EMAIL TYPES & STRUCTURES

                                In this course you will learn the role of email security in the workplace as well as why it's important. How to keep staff and the organisation protected, and includes: 

                                • GDPR Implications - GDPR has changed how businesses should view email security. We discuss the implications and considerations of the new legislation on organizational email security. 

                                • Resources For Employees and Managers - Suitable if you want to provide your employees with training, or are a manager looking for extra tips, resources and demos on email security. 

                                There are dozens and dozens of potential threats that can start through email. They come in many forms and almost all of them include some form of human interaction.

                                All of the most significant and common threats to your company’s files and your email security happen because of something that someone does.

                                With regular training for employees that includes phishing simulations, courses on IT and security best practices, and data protection and compliance training, businesses can significantly reduce risk, decrease infections and related help desk costs, protect their reputation by experiencing fewer breaches, and secure their overall cyber security investment.

                                COURSE CONTENT:

                                1. INTRODUCTION TO EMAILS.

                                      2. TYPES OF EMAIL ACCOUNTS AVAILABLE.

                                              • TYPES OF EMAIL ACCOUNTS
                                              • EMAIL TYPE: “POP”
                                              • EMAIL TYPE: “IMAP”
                                              • EMAIL TYPE: “EXCHANGE”

                                              3. STRUCTURE OF AN EMAIL AND EMAIL ADDRESS.

                                                      • EMAIL STRUCTURE
                                                      • THE EMAIL HEADER
                                                      • EMAIL ADDRESS
                                                      • STRUCTURE
                                                      • THE @ SYMBOL

                                                        4. EMAIL HEADERS AND PROPERTIES.

                                                                • ABOUT EMAIL HEADERS AND PROPERTIES
                                                                • HOW TO VIEW AN EMAILS HEADERS AND PROPERTIES.
                                                                • UNDERSTANDING EMAIL HEADERS
                                                                • IP ADDRESS


                                                          MAIL CYBER SECURITY: EMAIL SPAMMING AND COMPLIANCE

                                                          The most effective way to protect your company’s information is to institute a company-wide security awareness training program that will get everyone up to speed on what to do and what not to do.  Make certain than your staff is not your weakest link in maintain the security of your firm’s data and servers.

                                                          Security awareness training is ongoing education that provides employees relevant information and tests of their cyber-awareness by covering all aspects of data security and regulatory compliance. It is a proven way of changing risky employee IT behaviors that can lead to security compromises—including financial, intellectual property, customer trust and other major data losses—and increases businesses’ resilience against attacks.

                                                          These may include how to avoid phishing and other types of social engineering cyber attacks, spot potential malware behaviors, report possible security threats, follow company IT policies and best practices, and adhere to any applicable data privacy and compliance regulations (GDPR, PCI DSS, HIPAA, etc.)

                                                          CONTENT

                                                          1. SPAM

                                                                • WHAT IS SPAM
                                                                • WHAT IS THE PURPOSE OF SPAM
                                                                • WHY DO I GET SPAM EMAILS
                                                                • SPAM vs PHISHING
                                                                • HOW DO I STOP SPAM

                                                                2. EMAIL CONFIDENTIALITY DISCLAIMERS.

                                                                      • INTRODUCTION
                                                                      • COMMON REASONS TO USE EMAIL
                                                                      • DISCLAIMERS
                                                                      • PURPOSE OF EMAIL
                                                                      • CONFIDENTIALITY STATEMENTS?
                                                                      • HOW CAN AN EMAIL DISCLAIMER PROTECT YOU?
                                                                      • IS AN EMAIL DISCLAIMER LEGALLY BINDING?

                                                                          3. COMPLIANCE

                                                                                • INTRODUCTION
                                                                                • GDPR COMPLIANCE
                                                                                • EUROPEAN COMPANIES
                                                                                • HIPAA
                                                                                • COMPLIANCE – UNITED STATES
                                                                                • COMPANY
                                                                                • POLICIES.

                                                                                4. NEWSLETTERS

                                                                                      • INTRODUCTION
                                                                                      • WHAT DOES THE LAY


                                                                                EMAIL CYBER SECURITY: EMAIL SPOOFING AND PROTECTION

                                                                                Email continues to be one of the top vectors for cyber attacks. From phishing emails and ransomware to impersonation and CEO fraud, many of the most devastating security breaches originate with an email. Human error is central to the success of these attacks – it only takes one employee making one mistake to enable a security catastrophe.

                                                                                • One in five workers let family members use the work laptops to access the internet.
                                                                                • Over 50% of them connect their own devices and gadgets to their laptops, 10% of them knowingly downloaded content that they know that they shouldn’t have, and 62% admitted to having very little knowledge of IT.
                                                                                • Over half of them have no idea how to update their antivirus software and 5% of them admitted to accessing areas of the company’s IT system that they shouldn’t have.

                                                                                There are dozens and dozens of potential threats that can start through email. They come in many forms and almost all of them include some form of human interaction.

                                                                                All of the most significant and common threats to your company’s files and your email security happen because of something that someone does.

                                                                                CONTENT

                                                                                1. EMAIL SPOOFING

                                                                                      • WHAT IS EMAIL SPOOFING
                                                                                      • REASONS FOR EMAIL SPOOFING
                                                                                      • HOW TO DETECT EMAIL SPOOFING
                                                                                      • HOW TO STOP EMAIL SPOOFING

                                                                                    2. SELECT, MANAGE AND TEST YOUR VIRUS PROTECTION.

                                                                                          • YOUR VIRUS PROTECTIONS
                                                                                          • REVIEW YOUR VIRUS PROTECTION
                                                                                          • MINIMIZE INCOMING PHISHING EMAILS
                                                                                          • TEST YOUR ANTIVIRUS SOFTWARE

                                                                                        3. MALWARE AND HOW IT WORKS.

                                                                                              • WHAT IS MALWARE?
                                                                                              • HOW DO I KNOW IF I DEVICE IS INFECTED?
                                                                                              • SUSPICIOUS EMAIL WARNING SIGNS.
                                                                                              • HOW DO I GET MALWARE?
                                                                                              • WHAT TO DO IF YOU CLICK ON A SUSPICIOUS EMAIL LINK?
                                                                                              • WHAT DOES MALWARE DO?
                                                                                              • HOW MUCH CAN A HACKER ACTUALLY SEE ON YOUR MACHINE?

                                                                                                  4. ATTACHMENTS AND FILE TYPES.

                                                                                                        • WHAT IS A DATA FILE?
                                                                                                        • WHERE ARE DATA FILES STORED?
                                                                                                        • HOW TO VIEW THE FILE TYPE?
                                                                                                        • COMMON FILE TYPES AND EXTENSIONS?
                                                                                                        • HOW TO SPOT UN-SAFE FILES?
                                                                                                        • FILE SIZE
                                                                                                        • PROTECTION VIEW

                                                                                                            5. EXTERNAL AND INTERNAL URLs LINKS.

                                                                                                                  • WHAT IS A URL?
                                                                                                                  • EXTERNAL URL
                                                                                                                  • LINKS
                                                                                                                  • BREAKING DOWN
                                                                                                                  • THE URL
                                                                                                                  • STRUCTURE
                                                                                                                  • FTP URL
                                                                                                                  • LOCAL NETWORK
                                                                                                                  • URL
                                                                                                                  • CLOUD SERVICE
                                                                                                                  • COMMON TRICKS USED