Juniata Classifieds>Juniata Online Courses>Introduction to Learning Transfer and Life Long Learning (3L)

Introduction to Learning Transfer and Life Long Learning (3L)

About this Course

Learn how to identify the enablers and barriers to learning transfer. Use your own experience to categorise the processes and activities involved in learning and transferring that learning into practice. There are many criteria against which the success of training and development activities can be judged. One of the most important, however, is learning transfer. Ultimately, the success of any given training and/or development program is reflected in whether or not what is learned is applied on the job. Organisations - and indeed trainees themselves - invest large amounts of time, effort, and resources in work-related training and generally expect to see this manifested in some way back in the work setting (e.g. as observable changes to how work is conducted). However, many organisations and their people view the likelihood of transfer of training more in hope than expectation. This course will show you how to approach the goal of improving learning transfer in your organisation.

Created by: University of California, Irvine


Related Online Courses

In the fourth course of the Deep Learning Specialization, you will understand how computer vision has evolved and become familiar with its exciting applications such as autonomous driving, face... more
This course provides a thorough understanding of what DevOps is and the cultural changes that are required to adopt it. Addressed in this course are the tools used in a DevOps environment,... more
This course familiarizes you with standards and policies of the electric utility industry, and provides you with basic vocabulary used in the business. It introduces the electric power system, from... more
Athletes, lawyers and team executive experts provide insight in how law and regulations intersect with data analytics and sports management techniques for best practices in the sports industry.... more
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL