We use cookies on this website to improve your experience. Please refer to our Privacy Policy for more information.

Cerco IT's Training Courses

We offer two types of training:

You may also want to learn more about our core values.

To better serve our customers we have created professional courses to prepare you for a career in IT.
Our training, much like the world of IT, evolves to meet the needs of the market.

Our courses are 100% FREE and 100% hands-on.

Am I eligible for Cerco IT's FREE training courses?

The FastTrack IT Course

This course, as the name may suggest, is designed to quickly equip you with the core skills to become a Field Tech Engineer.
To that end it is designed to meet the technical requirements outlined by our clients.
We will teach the basics of computer hardware, software and configuration in a practical, hands-on manner that prepares you for a range of duties including, but not limited to:

  • Server / hardware maintenance
  • Software configuration
  • Network configuration
  • Server / hardware installation and removal
  • Printer installation

We also undertake contract specific training where candidates may be trained on-site or invited back to our training centre. This could be to cover things such as Retail EPOS installations through to mounting of Audio Visual equipment.

Once you have completed the course you will possess the necessary skills and knowledge for the effective support of networked PC systems and common peripherals, together with a sound foundation on which to build further product training.

The course includes assessments for Cerco's exclusive Cerco Certificate in Systems and Networking (CCSN), which is recognised by our employer partners as an entry-level qualification for systems service technicians.

The course covers many fundamental topics and therefore prepares delegates to go on to achieve other certification such as the CompTIA A+, Network+, MCP (Microsoft Certified Professional).
Depending on your experience the FastTrack course also serves as a pre-requisite for our Penetration Testing course, which itself forms a key part of our Cradle to Cyber programme.

No prior formal computer training is required but you must have awareness of, and some familiarity with, PC hardware and the use of PC systems, and you must possess suitable aptitude and a full, clean driving licence.

FastTrack Course Detail

  • Health and safety in the workplace
  • Electrostatic discharge
  • PC hardware connections
  • PC data storage
  • PC memory
  • How to strip down a PC
  • The ROM BIOS & CMOS set-up
  • Scripted install of a Windows 10 image
  • WDS install of Windows 10
  • Windows 10 configuration
  • Command line
  • Network Basics
    • Network Media
    • Network Topology
    • Network Standards Hubs, Switches and Routers
    • Network access methods
  • Windows Networking
    • Network configuration
    • Joining Windows domains
    • Wireless networking
  • TCP / IP Networking
    • TCP/IP Overview
    • TCP/IP Addressing
    • Name resolution
    • IP Address resolution
    • Routing
    • DHCP
    • TCP/IP Connectivity
    • TCP/IP
    • Troubleshooting
  • Logical fault finding/troubleshooting
  • Printer installation in Windows

Soft Skills

  • Customer care for IT support personnel
  • Appearance, politeness and listening
  • Handling complaints

To be considered for the Cerco FastTrack course please contact us today and tell us why you feel you would be suitable.

The Penetration Testing Course

In conjunction with our training partner Merimetso we offer a week long course dedicated to the discipline of Penetration Testing.
The course is the key stage of our Cradle to Cyber programme and takes you through the many facets of professional Ethical Hacking. Merimetso logo
Here are a few things you can expect to learn:

  • Information security in the corporate world
  • Professionalism and communication skills
  • Ethics and the law
  • Core network protocols
  • Network enumeration and network mapping
  • Network device management and exploitation
  • Service enumeration
  • Service topology/dependency mapping
  • Application enumeration and profiling
  • Application and operating system management
  • Application and operating system exploitation

The Merimetso course itinerary

  • Knowing the threat actors and their motives
  • Knowing your clients and why they engage your services
  • Supply chains, their impact and your responsibilities to them
  • Basic security monitoring
  • Pen test methodologies
  • Information gathering techniques – OSINT, passive network sniffing, DNS.
  • Computer Misuse Acts
  • GDPR and Data Protection
  • Using KALI
  • NMAP and port scanning tools
  • Metasploit
  • The OSI Model
  • TCP/IP and UDP protocols
  • ARP, FTP, IPsec, Wireless networking, DNS
  • Routing
  • Introduction to encryption
  • Active directory domains
    • RID and SID
    • LDAP
  • Operating systems and their architectures
  • System memory
  • Access control models and how they apply to operating systems
  • GRC security policies
  • OWASP Top Ten website penetration testing
  • Writing Reports
  • Understanding Risk Rating and Threats
  • Risk Scoring and Ranking
  • Pen Testing ‘Language’ and Terminology
  • Risk Management and Risk Analysis

To be considered for the Penetration Testing course please contact us today and tell us why you feel you would be suitable.