TRAINING COURSES

HOME   /   TRAINING   /   PHYSICAL PENETRATION TESTING

Physical Penetration Testing

Instructed by Robert Pingor, Chris Cochran, Brian Rea, Babak Javadi

This intense five-day training is geared toward students who need to be spun up rapidly in the field of physical site compromise and entry. Professionals already working in the field who wish to hone their existing covert entry capabilities will also derive great benefit from taking this course. A wide range of topics including multiple special focus modules across a variety of physical, digital, and human attack surfaces will be covered in great detail. This course covers topics from lock manipulation and bypass to mission planning including reconnaissance and target evaluation. Vulnerabilities in electronic physical access control systems and other enterprise security systems are also explored.

Classes are limited. Get registered!

Learn the following key skills:

  • Covert Entry Overview (Laws and Restrictions)
  • Pin Tumbler Lock Manipulation (Pick-Resistant Locks)
  • Wafer Locks in Cabinets and Panels
  • Warded Locks on Perimeter Barriers
  • Tubular Lock Systems
  • Cruciform locks
  • Bump Key Usage
  • Lock and Key Decoding
  • Key Origination
  • Key Control
  • Attacks Combination Locks and Lock Boxes
  • Padlock Bypassing
  • Door Latch and Deadbolt Bypassing (Residential vs Commercial Door Systems)
  • Impressioning
  • Master-Keyed Systems
  • Molding and Casting Keys
  • Elevator Systems
  • Electronic Physical Access Control Systems (RFID Credentials, Sensor Hardware, Controller Logic, Credential Cloning, Wiegand Interception, PIN Code Attacks)
  • Telephony Access Control Systems
  • Default Keys
  • Reconnaissance and Target Evaluation
  • Social Engineering
  • Destructive Entry
  • Field Expedient Tool Fabrication
  • Locksmith Software and Tools
  • Photographic Key Duplication
  • Forensic Locksmithing

Graduates of the training program can expect to be able to evaluate and approach a target structure -- whether commercial or residential -- and formulate a plan for gaining entry to the buildings and grounds as well as assorted locked containers and secured spaces that lay within, all with a focus on non-destructive techniques. Whether operating under the aegis of government authority or acting in a private sector security evaluation capacity, students will leave class equipped both mentally and materially to tackle the kinds of situations that our industry routinely presents to field agents.

Certification Preparation: This training course is seen by most in the industry as a key initial step on the pathway toward achievement of the tiered Red Team Certification Group credentialing process. Most participants who complete the course find themselves well prepared for the knowledge exam and practical hands-on exam portions of the Covert Entry Associate certification.

exploit-development-advanced
  • LEVEL

Beginner to Advanced

  • FORMAT

In person & Live-Online

  • LOCATION

Fredericksburg, VA (Main site), client site (upon request)

  • DURATION

5 days, 40 hours

  • TARGET AUDIENCE

For companies wishing to expand the scope of their internal security staff’s abilities and responsibilities

  • Standard Rate

Requirements

A laptop is required for this class. For the RFID and Electronic Access Control modules of the class, students will work with tools such as the Proxmark3 device, at such time they will utilize their laptop which should be running Windows 10 natively (not in a VM) with local admin rights enabled.

Prerequisites

No previous physical security experience required

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

robert2
Robert Pingor

Robert Pingor is Chief of The CORE Group’s Law Enforcement Division. Prior to that he founded Nomad Tactical Solutions. His policing and operations background was honed during his years at the National Security Agency where he served with distinction in four different specialty units as a Corporal.

Robert has extensive training in both the government and private sectors. He has instructed for the Department of Defense, the State Department, the National Security Agency, the United States Air Force, the United States Military Academy at West Point, the United States Naval Academy at Annapolis, the National Defense University, the Sig Sauer Academy and countless local law enforcement agencies. Additionally, he regularly conducts trainings for Black Hat, the SANS Institute, Google, and other technical conferences.

Outside of work Robert volunteers for a variety of charities and non-profits. He runs the Future Blue Program, an organization dedicated to developing young people into competent law enforcement professionals, and he trains volunteers to fight childhood sex trafficking. His work has been featured in Recoil Magazine, Counterterrorist Magazine, Tribecca Film Festival and the web tv series The Sentinel.

I really enjoyed the course! It was interesting to see a different perspective on penetration testing and ways of progressing from recon to initial access to escalating privilege and lateral movement.

- Robert L., Washington, DC

Want more information?

Download the Physical Penetration Testing course outline now.

Upcoming Training Sessions

October 18-22, 2021 (Fredericksburg, VA/Live-Online) January 10-14, 2022 (Fredericksburg, VA/Live-Online)

Classes are limited.

Enroll Now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

applied-data-science-for-cyber-security

Applied Data Science for Cyber Security

This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation to machine learning and implementation.

exploit-development-bootcamp

Exploit Development Bootcamp & Advanced

Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can help you get the training you need.

TRAINING INQUIRY

*We respect your privacy