Welcome to the Tech Train


The Tec Train delivers high quality training within the IT industry including; Fast Track Courses, Cyber Security Courses & Certified Courses.

We are a technical services business offering a wide range of training courses to highly motivated people looking to advance their careers through personal development. The Tec Train prides itself in bringing the right people to the IT industry. We assess applicants at all stages to make sure that they are suited to the industry. We offer a range of courses from a fast track entry level IT Field Engineer to Cyber Security, from Health and Safety in the Workplace to Manual Handing. We pride ourselves on providing the highest quality training at our training centres and we are continually looking to expand our range of courses.


Duration: 5 days

Location: Crewe Training Centre or Uxbridge Training Centre
We provide a one-week training course for people who are looking to get into IT, or as a refresher for those who are looking to get back into the IT industry. Our course is held in a classroom-based environment with access to trainers who are readily available to help the students.

We make the course as ‘hands on’ as possible where each student has their own desktop PC. We limit the number on each course to a maximum of 12 students at our Crewe Training Centre and a maximum of 8 students at our Uxbridge Training Centre to ensure you get the most out of the course. Not only will you learn about IT, ranging from hardware, operating system installation and configuration, to networking and fault-finding but also what it is like being a Field Service Engineer, and how to deal with customers. The Fast Track will give you a great start on your journey to progress onto our Cyber Security course.

Our candidates
At the core of The Tec Train, we believe in offering Ex-Forces a path to start their journey in the I.T. Industry. Our candidates come from differing backgrounds, but they all have the one thing in common; the love of I.T. A significant number of our successful candidates have a background in the Armed Forces. We are committed to supporting all Veterans whether you are an early leaver, reservist or have been medically discharged. If you have served, we know you will be smartly presented and highly committed.

Service leaders have the diverse and relevant experience and excellent personal qualities our customers are looking for. You have been tested in highly demanding and pressurised situations and are used to getting things done quickly and accurately is always a priority. Candidates from HM Forces are self-disciplined, motivated problem solvers who pick up new skills and adapt to new circumstances with ease. You could prove to be our ideal candidate, particularly for clients that have sensitive or confidential projects.

Previous IT experience has never been a pre-requisite of ours provided candidates are able to pass a thorough evaluation process; together with our intense 5-day practical training course and a stringent pre-employment screening process. This model consistently produces candidates with a high level of motivation, dedication, technical ability and strong customer service focus.

• Health and Safety
• Electrostatic Discharge
• PC Hardware Connections
• PC Data storage
• PC Memory
• How to strip down a PC
• Thin Clients
• The ROM BIOS & CMOS set-up
• Scripted install of a Windows 10 image
• WDS Install of Windows 10
• Windows 10 Configuration
• Command Line
• Putty/Hyper Terminal
• Servers

Network Basics
• Network Media
• Network Topology
• Network Standards
• Hubs, Switches and Routers
• Network access methods

Windows Networking
• Network configuration
• Joining Windows domains
• Wireless networking, installation and configuration

TCP/IP Networking
• Name resolution
• IP Address resolution
• Routing
• TCP/IP Configuration and Troubleshooting
• Logical fault finding/trouble shooting
• Laser Printing
• Printer Installation in Windows
• EPOS Awareness
• Customer Care
• How to be a good Engineer (following processes, timekeeping etc) Upon successful completion of the course, candidates may have the possibility of contracting or permanent work as an IT Field Engineer.

The digital age we are living in has seen Cybercrime rise exponentially with over 20 million reported cases worldwide every single day. There has been a 30% increase in the employment sector making Cyber Security the most sought-after talent in 2020. Globally there is a need to protect our networks and data so there will always be a need for these skills. The increased requirement for Cyber Security Specialists means that there is a great earning potential for Entry Level Pen Tester.


Duration: 4 Days

Location: Crewe Training Centre Or Uxbridge Training Centre

The training will start with a recap of knowledge the candidates are expected to have in order to contextualise elements of the course. This will include a good balance of practical activity, covering theory and legal elements to ensure that the correct methodology for a penetration test is undertaken each time.

To maintain flexibility, the course is broken down into modules that can be moved around to take into account the potential for mixed abilities in the classroom.

You will be assessed throughout the course through interactive activities and verbal feedback. Any areas for further development are discussed with the candidates at the earliest opportunity. On the assessment module, candidates will complete a practical scenario followed by the requirement to write a written report of findings. This will be scored and discussed with the candidate so that they are aware of their areas for further development. The skills gained from undertaking the course should allow the candidate to sit an external certified exam.


Penetration Testing Methodology
• The purpose of a penetration test
• Scoping the test
• Authority to test (customer, suppliers)
• Compliance requirements (if any) 

Legal framework
• Relevant legislation (these will be amended accordingly post Brexit)
• Computer Misuse Act 1990
• Communications Act 2003
• General Data Protection Regulation 2016
• Official Secrets Act 1989

Networking and enumeration fundamentals
• Network architecture types
• Common protocols and services
• Network fingerprinting
• Identification and exploitation
of services

• Common vulnerabilities
• Bug bounties
• Responsible disclosure

• Common cryptography methods
• Deprecated but often used cryptography methods

• Wireless networking protocols
• Packet sniffing
• Packet injection
• Key cracking

Social Engineering
• Common social engineering/fraud attack vectors
• Reconnaissance
• Execution
• Education / Awareness

Website applications
• Common scripting languages
• OWASP Top 10
• APIs
• Assessment tools

Mobile applications
• Android, iOS environments
• Common vulnerabilities
• Security assessment basics

Reporting of findings
• Structuring a penetration test report
• Articulating technical findings in non technical language
• Proposed remediation
• Scoring of risk against the
CIA model

Continued Professional Development (CPD)
• Low to no cost options
• Recommended reading
• Premium options

Upon successful completion of the course, candidates may have the possibility of contracting or permanent work as an Entry Level Penetration Tester.

SCJ Excellentia APCC