COURSES OFFERED BY WEBASHA TECHNOLOGIES - PAGE 2

List of all the courses offered by WebAsha Technologies.

WebAsha Technologies offers a total of 25 courses.



25 course(s) offered by 1 institutes

WebAsha Technologies Logo

Docker Certified Associate Training

Docker is an open-source platform for automating application deployment using containers. Containers are lightweight, isolated environments that package all the necessary components to run an application.

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

Certified Ethical Hacking CEH v12 Practical Training

This course teaches students how to use penetration testing tools to test the security of web applications, mobile apps, networks, physical devices, and computer systems.

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

Linux Automation (Ansible) Training

Automation has become a critical skill for Linux administrators to manage at scale and to efficiently manage systems across a hybrid cloud architecture.

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

Computer Hardware Training

Today, Computers & Telecommunication equipment have become vital components of our inhabits. The need of these sophisticated machines is constantly on the rise and so is the need for professionals who can function & service them.

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

CCNA ( 200-301) Cisco Certified Network Associate Training

A certified network associate (CCNA) is a person who has been trained to operate Cisco equipment and administer their operations. A CCNA performs tasks similar to those performed by a technician at a service provider.

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

CISSP Training

CISSP, which stands for Certified Information Systems Security Professional, is a globally recognized certification in the field of information security. It is offered by the International Information System Security Certification Consortium, also known as (ISC)².

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

CISM Training

CISM, which stands for Certified Information Security Manager, is a professional certification offered by ISACA (Information Systems Audit and Control Association).

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

COBIT 5 Training

COBIT® 5 is a globally recognized framework developed by the Information Systems Audit and Control Association (ISACA) for the governance and management of enterprise IT. It stands for Control Objectives for Information and Related Technologies.

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

Adobe InDesign

Adobe indesign is an industry standard outline and design program utilized by architects, distributers, craftsmen and scholars to create proficient quality handouts, magazines, books, publications and numerous other portable document format (pdf) or print based advertising materials. With its capab...

by WebAsha Technologies [ Claim Listing ]
WebAsha Technologies Logo

Adobe Illustrator

Our two day adobe illustrator course will show you how to make and keep up a wide scope of realistic sorts for purposes, for example, sites, corporate stationery, pamphlets and publicizing standards. Understanding the intricate details of adobe illustrator will give you the imaginative edge with re...

by WebAsha Technologies [ Claim Listing ]
Showing Courses 11 - 20

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy