TRAINING COURSES

HOME   /   TRAINING   /   PHYSICAL PENETRATION TESTING

Physical Penetration Testing

In this intense five-day course, students will learn a variety of covert techniques used to enter secure commercial facilities. From lock picking and key decoding to RFID cloning and alarm sensor bypassing, participants will receive instruction from the foremost covert entry industry authorities. This course will challenge students to maneuver their way through real-world scenarios. Students who demonstrate proficiency will receive a Certificate of Completion.

Classes are limited. Get registered!

Learn the following key skills:

  • Lock Picking
  • Advanced Lock Bumping
  • Lock Decoding
  • Key Decoding
  • Key Impressioning
  • Key Mold and Cast Techniques
  • Master Key Privilege Escalation
  • Lock Bypass Methods
  • Lock Cylinder Forensics
  • Bypassing of Electronic Access Controls
  • RFID Cloning / Replay / Bypass
  • Alarm Sensor Bypass
  • Construction of Field Expedient Tools
  • Facility / Site Recon
  • Physical > Digital > Social Attack Chain

Each student will be issued a professional covert entry toolkit to be used for the duration of the Course, which they are able to keep.

exploit-development-advanced
  • LEVEL

Beginner to Advanced

  • FORMAT

In person

  • DURATION

5 days, 40 hours

  • TARGET AUDIENCE

For companies wishing to expand the scope of their internal security staff’s abilities and responsibilities

  • REQUIREMENTS

No computer is needed

  • PREREQUISITES

No previous physical security experience required

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

I really enjoyed the course! It was interesting to see a different perspective on penetration testing and ways of progressing from recon to initial access to escalating privilege and lateral movement.

- Robert L., Washington, DC

Classes are limited.

Enroll Now.

Want more information?

Download the Physical Penetration Testing course outline now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

applied-data-science-for-cyber-security

Applied Data Science for Cyber Security

This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation to machine learning and implementation.

exploit-development-bootcamp

Exploit Development Bootcamp & Advanced

Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can
help you get the training you need.

TRAINING INQUIRY

*We respect your privacy