logo-img

Seat reservation

Oops! No seats reserved yet.
loading..



(603) 852 79 35 akasi-commercial@akasigroup.com 1, Tara boulevard # 101, Nashua NH 03062 United States
(603) 852 79 35 akasi-commercial@akasigroup.com 1, Tara boulevard # 101, Nashua NH 03062 United States

Courses catalog

160 Courses

Filter (0)
Showing 160 of 160 results

Topics

Software Development

IT Infrastructure & Networks

Enterprise Integration

Business Application & Analytics

Cloud Computing

Project Management

Machine Learning & Artificial Intelligence

Agile Developpement & Scrum Training

Sales, Marketing & Communication Strategies

Enterprise Security / Cyber Security Training Courses

Database

Health Safety Environment

Leadership and Personal development

IT Governance and enterprise Architecture

Certifications

Vendor

Level

Duration

Learning mode

Price

loading..

In this training course, you acquire the experience needed to implement high-performing, scalable, and secure transactional web-based applications, as well as gain an in-depth unde...

jQuery simplifies the process of creating powerful Web 2.0 applications with dynamic content and visual effects. In this training course, you gain the knowledge and skills to apply...

Increase productivity, accelerate development, and quickly build enterprise Java applications with the Spring and Hibernate frameworks. In this training course, you learn how to si...

Reliability, maintainability, and ease of development is what Java is known for, and its unique architecture enables programmers to develop a single application that can seamlessly...

Solve real-world software development problems, and deliver responsive applications that are fast and reliable. In this training course, you learn how to leverage Java best practic...

HTML5 empowers you to enhance the User Experience (UX) across all devices — from legacy desktop browsers, to the latest smartphones and tablets. In this training course, you gain...

Gain the necessary skills for responsive and mobile website design that fully harness sophisticated capabilities of web browsers on mobile devices. In this training course, you lea...

Extensible Markup Language (XML) has become the default format for systems, and can offer your organization an effective way to conduct business-to-business transactions and handle...

To efficiently handle today's business-critical information, organizations need database systems that are reliable and scalable, as well as experienced professionals to manage them...

Relational databases often drive the company-critical and web-enabled applications essential for achieving success in a highly competitive market. This training course is designed ...

In this course, you will learn how to manage all aspects of project procurement effectively. You will discover the logic behind contracting principles and practices, and you'll lea...

The challenges of a contemporary workplace present unique growth opportunities for leaders in the 21st century. In this training course, you learn to manage the sea change revoluti...

Add value to your organization by aligning department goals with your organization’s strategic vision and mission. In this training course, you learn to plan and implement change...

Managing a successful project involves more than schedules, templates, and paperwork. It requires the application of strong interpersonal management skills to work effectively with...

Effectively manage your software development efforts by selecting the correct development life cycle, creating realistic plans, and managing a team through each project phase. In t...

Nearly every project runs into problems sooner or later. How do you keep those problems from escalating into full-blown crises? In this short course, you will learn how to identify...

Whether you are asking for resources, negotiating with a vendor, or dealing with conflicts on the team, being a skilled negotiator makes you a better project manager. In this activ...

Microsoft Project provides the flexible and intuitive tools and solutions to help create the project plan, track progress, adjust resources as needed, and make the project more vis...

Managing a complex project means not only having fantastic project management skills, but also understanding how to deal with the chaos of today's workplace. Technology, requiremen...

Learn the fundamentals and best practices of project management methodology as applied to IT initiatives, and practice and master the skills you need to deliver IT projects on time...

In this comprehensive course, you will learn the fundamentals of project management: how to initiate, plan, and execute a project that meets objectives and satisfies stakeholders. ...

If your project costs routinely go over budget, your credibility as a project manager will be jeopardized. Having accurate cost estimates will help you manage your project, track s...

The Cisco CCNA® curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), a derivative works course consisting of Interconnecting Cisco Ne...

Take a more active part in the discussion and decision-making processes related to networking technology issues. In this training course, you take your first step toward networking...

The ability to provide users with constant access to critical data is essential for the success of today's rapidly evolving networks. In this training course, you gain a comprehens...

The Cisco CCNA® curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), a derivative works course consisting of Interconnecting Cisco Ne...

What is Big Data? + Key Reasons to Learn Big Data Analytics starting with a vendor-agnostic approach: This Intro to Big Data is a unique approach to help you act on data for real...

Expand your mobile app reach through this Android development and programming training course. Android’s open source platform offers compatibility with a wide range of devices, w...

Public speaking is required in almost every business role, but a variety of factors cause many professionals to struggle when talking in front of an audience. In this training cour...

Those who communicate with assertiveness, rather than passivity or aggression, are more likely to maintain positive workplace relationships while meeting their goals. Through video...

This course provides experienced Java programmers with the skills to write new SOAP and REST web services, and access existing services. With this training, you also learn how to s...

This five-day course describes how to assess operating system and application deployment options, determine the most appropriate deployment strategy, and then implement a deploymen...

Improve customer satisfaction and achieve consistent quality with this quality assurance training. In this course, you learn to define, design, and effectively lead Quality Assuran...

Improve customer satisfaction and product delivery by applying techniques from this user and system requirements course. With this training, you will gain the skills to capture sof...

Increase efficiency, and decrease maintenance time and development costs with this Software Control Management (SCM) training. In this course, you practice configuration activities...

Support the modern applications that your organization relies on by gaining the skills to design, build, and maintain a Service-Oriented Architecture (SOA). In this SOA training co...

Bring greater efficiency to your IT infrastructure by learning to employ the standardized and finely tuned processes of the Linux operating system in your enterprise environment. I...

Leverage the flexibility and scalability of your Linux OS to meet your organization's critical and ongoing IT needs. In this Linux administration and support training course, you l...

DCACIF (Data Center Application Centric Infrastructure Fundamentals) is a 5-day Instructor-led training course that is designed for systems & field engineers who install & implemen...

Cloud computing potentially affects every aspect of an organization’s IT department. In this training course, you will evaluate and assess the business and technical benefits of ...

What Is ITIL? + Key Benefits of this ITIL Certification Course: This ITIL Foundation Certification training course is where you can start your journey into the realm of ITIL (Inf...

...

To help close the workforce gap, (ISC)2 launched the Certified in Cybersecurity (CC) entry-level certification. With no experience required, it opens opportunities in the field to ...

On 25th May 2018, the EU GDPR came into effect; and it’s here to stay well beyond Brexit. This significant legislation will succeed the Data Protection Act 1998 (DPA), and is des...

The (ISC)² Certified Cloud Security Professional CCSP Training Course is designed for security professionals seeking to enhance their knowledge of cloud security. The program cove...

This training program provides job training for individuals and assessment teams to become a Certified CMMC Assessor (CCA) and take the Certified CMMC Professional (CCP) exam. The ...

Regardless of your computer experience, this course will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from t...

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v12) exam....

The Certified Information Privacy Manager (CIPM) course is the “how-to” of privacy training. The CIPM is the world’s first and only certification in privacy program managemen...

Certified Information Privacy Professional (CIPP/US) covers U.S. government privacy laws, regulations and policies specific to government practice, as well as those more broadly ap...

The “how” of privacy and technology. Certified Information Privacy Technologist (CIPT) training covers privacy and data protection practices in the development, engineering, de...

An ISACA CISA (Certified Information Systems Auditor) is recognized as one of the leading authorities in the areas of IS (Information Systems) auditing, control, and information se...

In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn the tactical skills needed to design and manage a se...

This official ISACA CRISC training provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and co...

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared...

It has become even clearer that organizations with corporate and IT governance policies and processes in place are better able to adapt quickly to changing situations and maintain ...

This official (ISC)2® Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam. The Certified Authorization Professional (CAP®) has changed its...

This EC-Council Computer Hacking Forensic Investigator (CHFI) certification course will prepare you to achieve this in-demand certification. Learn a detailed, methodological approa...

In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager. This course wil...

The CISSP Training and Certification Prep Course is a comprehensive training course aimed at preparing individuals for the CISSP Certified Information Systems Security Professional...

In this course, you will learn the essential principles of auditing cloud computing systems to successfully obtain the Cloud Audit Certification (CCAK). The CCAK Certification tra...

Recent sweeping updates to the U.S. Department of Defense Cybersecurity Maturity Model Certification (CMMC) requirements have left the consultants, contractors, and the Defense Ind...

This CASP+ Training course prepares you for the CompTIA CASP+ certification exam (CAS-004) and demonstrates your knowledge and skills in enterprise security, risk management, resea...

This comprehensive CompTIA Cloud+ course is designed to equip you with the skills needed to pass the CompTIA Cloud+ CV0-003 exam and earn your certification. With topics ranging fr...

Join our CompTIA CySA+ Certification Training and gain the knowledge and skills to prepare for and pass the Cybersecurity Analyst (CySA+) exam. In this course, you'll learn how to ...

The CompTIA PenTest+ training course prepares IT professionals to pass the PenTest+ PT0-002 certification exam and develop the skills necessary for effective penetration testing. T...

Looking to advance your career in information security? Look no further than CompTIA Security+ Training. This comprehensive course covers everything you need to know to pass the Co...

Attend this official (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) training and certification course and get prepared to achieve this premier secure software dev...

This risk assessment training course will teach you how to conduct a security risk assessment to protect your organization. You will learn about the laws and regulations that impos...

In this Cyber Security Success Factors training course, you gain an introduction to the four pillars of cyber security and learn how to examine real cyber attacks and deploy counte...

This cybersecurity training course prepares managers, members of the board and senior executives to understand, assess, and take a proactive posture in cybersecurity....

This CyberSec First Responder Certification course from CertNexus takes a holistic approach to prepare IT Professionals to analyze threats, secure networks, and utilize critical pr...

The CMMC certification training (Cybersecurity Maturity Model Certification), managed by Cyber AB (Accreditation Body), is a program through which an organization's cybersecurity p...

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting ...

Learn the security techniques used by the Internet’s most skilled professionals. This Digital Media Forensics Essentials lab bundle, which includes 19 distinct, hands-on labs, wi...

In this disaster recovery and business continuity course, you will gain the skills to identify mission-critical continuity needs, define sources of risk, create an incident respons...

Certified Threat Intelligence Analyst (C|TIA) is a new training program designed and developed to help organizations identify and mitigate various business risks by converting unkn...

This 3-Day EC-Council Certified Application Security Engineer (CASE) .NET course is designed to be a hands-on, comprehensive application security training course that will help sof...

The Certified CISO (CCISO) EC-Council program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO do...

The Certified Cybersecurity Technician (C|CT) is an entry-level certification program engineered to address specifically the increasing need for cybersecurity technicians with stro...

The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to computer security incidents in an information system...

Learn the hacking techniques used by the Internet’s most skilled professionals. This Ethical Hacking Essentials lab bundle, which includes 22 distinct, hands-on labs, will prepar...

From proactive requirements to coding and testing, this secure software development training course covers the best practices any software developer needs to avoid opening up their...

This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Ide...

SCOR Course Outline - The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certi...

In this Information Security Training course, you will gain the foundational knowledge and skills to analyze and assess network risks and then select and deploy appropriate counter...

In this Introduction to Cybersecurity training course, you will learn to protect your organization from social engineering attacks and cyber threats through disaster recovery metho...

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and ...

This Microsoft Cybersecurity Architect (SC-100) course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Gov...

The Microsoft Identity and Access Administrator course explores using Azure AD to design, implement, and operate an organization’s identity and access management systems. Learn t...

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers imp...

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. This Microsoft Security Operations Analyst Tr...

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions....

This Microsoft 365 Security Administrator course will teach you how to secure user access to your organization's resources. First, the course covers user password protection, mult...

Confidently design, configure, manage, troubleshoot, and analyze traffic of any wired and wireless networks. This Network Essentials lab bundle, which includes 16 distinct, hands-o...

Learn the security techniques used by the Internet’s most skilled professionals. This Pentesting & Network Exploitation lab bundle, which includes 4 distinct, hands-on labs, will...

In this Penetration Testing training course, you learn how hackers compromise operating systems and evade antivirus software. You will learn to discover weaknesses in your own netw...

This 1-day NICE Framework workshop provides a practical demonstration of how to apply the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework t...

Gauge your organization’s cyber security posture and assess your readiness to implement a formal risk assessment and management process. In this NIST Compliance Checklist trainin...

This NIST (National Institute of Standards and Technology) Cybersecurity Framework training course will teach US (United States) Government cybersecurity staff to protect their org...

This SecDevOps Practitioner® (SDOP) Certification Training follows the SecDevOps foundational practice in Course 3695, SecDevOps Foundation® (SDOF) Certification Training. While ...

...

The Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 course shows you how to deploy and use Cisco Firepower® Threat Defense system. This hands-on cour...

This course is a lab-intensive course which introduces you to the basic next-generation intrusion prevention system (NGIPS) and firewall security concepts, and the Cisco Firepower ...

This Full Stack Cybersecurity Training for Web Apps and Services course provides in-depth, hands-on experience securing Web-based applications and their servers. You will gain in-d...

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancin...

Learn the security techniques used by the Internet’s most skilled professionals. This Security Essentials lab bundle, which includes 19 distinct, hands-on labs, will prepare you ...

The SSCP Certification Course is a comprehensive training program designed to prepare individuals to become Systems Security Certified Practitioners. The course covers the essentia...

This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains. Attendees will learn how to identify cr...

Learn the security techniques used by the Internet’s most skilled professionals. This Systems Security Essentials lab bundle, which includes 32 distinct, hands-on labs, will prep...

This course covers the U.S. Office of Management and Budget (OMB) mandate requiring the adoption of Technology Business Management (TBM) across the Federal Government. Completing ...

The Understanding Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the ...

Learn the security techniques used by the Internet’s most skilled professionals. This Vulnerability & Assessment Management lab bundle, which includes 19 distinct, hands-on labs,...

This Vulnerability Assessment training course teaches you how to minimize costly security breaches and evaluate the risk in your enterprise from an array of vulnerabilities. You wi...

Learn what zero trust security is, how it solves typical security issues, and how to implement it in your environment. In this Zero Trust Security Training, you'll learn about zero...

...

...

...

...

...

...

...

...

Increase productivity and maximize the potential of SQL to formulate intricate queries for Oracle databases. In this training course, you learn to solve business problems easily, e...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...