Physical Penetration Testing
In this intense five-day course, students will learn a variety of covert techniques used to enter secure commercial facilities. From lock picking and key decoding to RFID cloning and alarm sensor bypassing, participants will receive instruction from the foremost covert entry industry authorities. This course will challenge students to maneuver their way through real-world scenarios. Students who demonstrate proficiency will receive a Certificate of Completion.
Classes are limited. Get registered!
Learn the following key skills:
Each student will be issued a professional covert entry toolkit to be used for the duration of the Course, which they are able to keep.
Beginner to Advanced
In person with Web-based option
5 days, 40 hours
No computer is needed
No previous physical security experience required
Why choose the Center for Cyber Security Training
Interactive, classroom-based learning
Subject matter experts
Trusted by US government agencies
I really enjoyed the course! It was interesting to see a different perspective on penetration testing and ways of progressing from recon to initial access to escalating privilege and lateral movement.
- Robert L., Washington, DC
Classes are limited.
Want more information?
Download the Physical Penetration Testing course outline now.
Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.
Applied Data Science for Cyber Security
This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation to machine learning and implementation.
Exploit Development Bootcamp & Advanced
Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.