logo-img

Seat reservation

Oops! No seats reserved yet.
loading..



(603) 852 79 35 akasi-commercial@akasigroup.com 1, Tara boulevard # 101, Nashua NH 03062 United States
(603) 852 79 35 akasi-commercial@akasigroup.com 1, Tara boulevard # 101, Nashua NH 03062 United States

Courses catalog

68 Courses

Filter (0)
Showing 68 of 68 results

Topics

Software Development

IT Infrastructure & Networks

Enterprise Integration

Business Application & Analytics

Cloud Computing

Project Management

Machine Learning & Artificial Intelligence

Agile Developpement & Scrum Training

Sales, Marketing & Communication Strategies

Enterprise Security / Cyber Security Training Courses

Database

Health Safety Environment

Leadership and Personal development

IT Governance and enterprise Architecture

Certifications

Vendor

Level

Duration

Learning mode

Price

loading..

To help close the workforce gap, (ISC)2 launched the Certified in Cybersecurity (CC) entry-level certification. With no experience required, it opens opportunities in the field to ...

On 25th May 2018, the EU GDPR came into effect; and it’s here to stay well beyond Brexit. This significant legislation will succeed the Data Protection Act 1998 (DPA), and is des...

The (ISC)² Certified Cloud Security Professional CCSP Training Course is designed for security professionals seeking to enhance their knowledge of cloud security. The program cove...

This training program provides job training for individuals and assessment teams to become a Certified CMMC Assessor (CCA) and take the Certified CMMC Professional (CCP) exam. The ...

Regardless of your computer experience, this course will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from t...

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v12) exam....

The Certified Information Privacy Manager (CIPM) course is the “how-to” of privacy training. The CIPM is the world’s first and only certification in privacy program managemen...

Certified Information Privacy Professional (CIPP/US) covers U.S. government privacy laws, regulations and policies specific to government practice, as well as those more broadly ap...

The “how” of privacy and technology. Certified Information Privacy Technologist (CIPT) training covers privacy and data protection practices in the development, engineering, de...

An ISACA CISA (Certified Information Systems Auditor) is recognized as one of the leading authorities in the areas of IS (Information Systems) auditing, control, and information se...

In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn the tactical skills needed to design and manage a se...

This official ISACA CRISC training provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and co...

The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared...

It has become even clearer that organizations with corporate and IT governance policies and processes in place are better able to adapt quickly to changing situations and maintain ...

This official (ISC)2® Certified in Governance, Risk and Compliance (CGRC) Training prepares you for the CGRC exam. The Certified Authorization Professional (CAP®) has changed its...

This EC-Council Computer Hacking Forensic Investigator (CHFI) certification course will prepare you to achieve this in-demand certification. Learn a detailed, methodological approa...

In this course, you will gain the knowledge and skills needed to successfully pass the certification exam and become a CISM Certified Information Security Manager. This course wil...

The CISSP Training and Certification Prep Course is a comprehensive training course aimed at preparing individuals for the CISSP Certified Information Systems Security Professional...

In this course, you will learn the essential principles of auditing cloud computing systems to successfully obtain the Cloud Audit Certification (CCAK). The CCAK Certification tra...

Recent sweeping updates to the U.S. Department of Defense Cybersecurity Maturity Model Certification (CMMC) requirements have left the consultants, contractors, and the Defense Ind...

This CASP+ Training course prepares you for the CompTIA CASP+ certification exam (CAS-004) and demonstrates your knowledge and skills in enterprise security, risk management, resea...

This comprehensive CompTIA Cloud+ course is designed to equip you with the skills needed to pass the CompTIA Cloud+ CV0-003 exam and earn your certification. With topics ranging fr...

Join our CompTIA CySA+ Certification Training and gain the knowledge and skills to prepare for and pass the Cybersecurity Analyst (CySA+) exam. In this course, you'll learn how to ...

The CompTIA PenTest+ training course prepares IT professionals to pass the PenTest+ PT0-002 certification exam and develop the skills necessary for effective penetration testing. T...

Looking to advance your career in information security? Look no further than CompTIA Security+ Training. This comprehensive course covers everything you need to know to pass the Co...

Attend this official (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) training and certification course and get prepared to achieve this premier secure software dev...

This risk assessment training course will teach you how to conduct a security risk assessment to protect your organization. You will learn about the laws and regulations that impos...

In this Cyber Security Success Factors training course, you gain an introduction to the four pillars of cyber security and learn how to examine real cyber attacks and deploy counte...

This cybersecurity training course prepares managers, members of the board and senior executives to understand, assess, and take a proactive posture in cybersecurity....

This CyberSec First Responder Certification course from CertNexus takes a holistic approach to prepare IT Professionals to analyze threats, secure networks, and utilize critical pr...

The CMMC certification training (Cybersecurity Maturity Model Certification), managed by Cyber AB (Accreditation Body), is a program through which an organization's cybersecurity p...

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting ...

Learn the security techniques used by the Internet’s most skilled professionals. This Digital Media Forensics Essentials lab bundle, which includes 19 distinct, hands-on labs, wi...

In this disaster recovery and business continuity course, you will gain the skills to identify mission-critical continuity needs, define sources of risk, create an incident respons...

Certified Threat Intelligence Analyst (C|TIA) is a new training program designed and developed to help organizations identify and mitigate various business risks by converting unkn...

This 3-Day EC-Council Certified Application Security Engineer (CASE) .NET course is designed to be a hands-on, comprehensive application security training course that will help sof...

The Certified CISO (CCISO) EC-Council program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO do...

The Certified Cybersecurity Technician (C|CT) is an entry-level certification program engineered to address specifically the increasing need for cybersecurity technicians with stro...

The EC-Council Certified Incident Handler (ECIH) program is designed to provide the fundamental skills to handle and respond to computer security incidents in an information system...

Learn the hacking techniques used by the Internet’s most skilled professionals. This Ethical Hacking Essentials lab bundle, which includes 22 distinct, hands-on labs, will prepar...

From proactive requirements to coding and testing, this secure software development training course covers the best practices any software developer needs to avoid opening up their...

This identity and access management course will teach you to strengthen your organization’s security and simplify access to critical resources by implementing the appropriate Ide...

SCOR Course Outline - The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certi...

In this Information Security Training course, you will gain the foundational knowledge and skills to analyze and assess network risks and then select and deploy appropriate counter...

In this Introduction to Cybersecurity training course, you will learn to protect your organization from social engineering attacks and cyber threats through disaster recovery metho...

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and ...

This Microsoft Cybersecurity Architect (SC-100) course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Gov...

The Microsoft Identity and Access Administrator course explores using Azure AD to design, implement, and operate an organization’s identity and access management systems. Learn t...

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers imp...

Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. This Microsoft Security Operations Analyst Tr...

This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions....

This Microsoft 365 Security Administrator course will teach you how to secure user access to your organization's resources. First, the course covers user password protection, mult...

This 1-day NICE Framework workshop provides a practical demonstration of how to apply the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework t...

Gauge your organization’s cyber security posture and assess your readiness to implement a formal risk assessment and management process. In this NIST Compliance Checklist trainin...

This NIST (National Institute of Standards and Technology) Cybersecurity Framework training course will teach US (United States) Government cybersecurity staff to protect their org...

This SecDevOps Practitioner® (SDOP) Certification Training follows the SecDevOps foundational practice in Course 3695, SecDevOps Foundation® (SDOF) Certification Training. While ...

...

This course is a lab-intensive course which introduces you to the basic next-generation intrusion prevention system (NGIPS) and firewall security concepts, and the Cisco Firepower ...

This Full Stack Cybersecurity Training for Web Apps and Services course provides in-depth, hands-on experience securing Web-based applications and their servers. You will gain in-d...

This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancin...

Learn the security techniques used by the Internet’s most skilled professionals. This Security Essentials lab bundle, which includes 19 distinct, hands-on labs, will prepare you ...

The SSCP Certification Course is a comprehensive training program designed to prepare individuals to become Systems Security Certified Practitioners. The course covers the essentia...

This course provides an introduction to fundamental cybersecurity risk management concepts and how they are applied to modern supply chains. Attendees will learn how to identify cr...

Learn the security techniques used by the Internet’s most skilled professionals. This Systems Security Essentials lab bundle, which includes 32 distinct, hands-on labs, will prep...

The Understanding Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the ...

Learn the security techniques used by the Internet’s most skilled professionals. This Vulnerability & Assessment Management lab bundle, which includes 19 distinct, hands-on labs,...

This Vulnerability Assessment training course teaches you how to minimize costly security breaches and evaluate the risk in your enterprise from an array of vulnerabilities. You wi...

Learn what zero trust security is, how it solves typical security issues, and how to implement it in your environment. In this Zero Trust Security Training, you'll learn about zero...