COURSE

Physical Penetration Testing

Course

As a red team member, you may perform physical penetration tests where you identify gaps in physical barriers to show how a threat actor could gain access to sensitive areas or data. Learn the tools and social engineering skills physical pen testers use and how to recommend steps for remediation in this physical penetration testing training.
Full access included with 
Insider Pro
 and 
Teams

6

H

47

M
Time

beginner

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

7

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Read More

Skills you'll gain

Course Outline

1
Module 1: Fundamentals of Physical Penetration Testing
0
H
41
Min
1
Module 2: Planning Phase
0
H
26
Min
1
Module 3: Information Gathering Methods
0
H
26
Min
1
Module 4: Types of Equipment
0
H
39
Min
1
Module 5: Social Engineering
0
H
59
Min
1
Module 6: Lock Picking
0
H
38
Min
1
Module 7: Bypassing Tools and Strategies
1
H
4
Min
1
Module 8: Executing a Physical Penetration Test
0
H
42
Min
1
Module 9: Improving Security
0
H
27
Min
1
Module 10: Summary and Stories
0
H
46
Min
1
Course Assessment
0
H
30
Min

10.1 Introduction

Free

0m

9.1 Limiting Information Exposure

Free

5m

8.1 Executing a Physical Penetration Test Introduction

Free

2m

7.1 Bypassing Tools and Strategies Introduction

Free

2m

6.1 What is Lock Picking and Basics of a Pin Lock

Free

5m

5.1 What is Social Engineering

Free

7m

4.1 Equipment Introduction

Free

2m

3.1 Information Gathering Methods

Free

7m

2.1 Receiving the Old Job and Rules of Engagement

Free

4m

1.1 Course introduction

Free

7m

10.2 Fundamentals of Penetration Testing Summary

Free

4m

9.2 Defending Against Social Engineering Attacks

Free

7m

8.2 Types of Approaches Introduction

Free

1m

7.2 Door Bypass Tools Introduction

Free

1m

6.2 Basics of Other Common Locks

Free

7m

5.2 Psychological Concepts Instruction

Free

5m

3.2 IMINT, Electronic Surveillance, Active Recon

Free

7m

4.2 Lock Picks

Free

2m

2.2 Deterring Risks

Free

5m

1.2 Basics of Physical Penetration Testing

Free

8m

9.3 Data Deconstruction Against Electronic Monitoring

Free

11m

10.3 Planning Phase Summary

Free

4m

8.3 Overt Testing

Free

2m

7.3 Under the Door Tools

Free

10m

6.3 Section Summary

Free

1m

5.3 Six Key Principles of Influence Part 1

Free

5m

3.3 Information Gathering Labs

Free

10m

4.3 Bypass Tools

Free

8m

2.3 Info Gathering, Planning, Equipment, Communication, and Docs

Free

8m

1.3 Common Terms

Free

8m

10.4 Information Gathering Summary

Free

5m

9.4 Module 9 Summary and Quiz

Free

4m

7.4 Door Shimming Tools

Free

3m

6.4 Picking Pin Locks Introduction

Free

1m

5.4 Six Key Principles of Influence Part 2

Free

6m

2.4 Assembling an Operations Team

Free

6m

4.4 Introduction to Specialized Hacking Tools

Free

1m

3.4 Module 3 Summary and Quiz

Free

2m

1.4 Why Get a Physical Penetration Test?

Free

5m

10.5 Types of Equipment Summary

Free

8m

8.5 Unseen Testing

Free

2m

7.5 Crash Bar Tools

Free

2m

6.5 Basics of a Lock Picking Set

Free

2m

5.5 Additional Principles of Influence

Free

10m

4.5 Specialized Hacking Tools Part 1

Free

7m

2.5 Module 2 Summary and Quiz

Free

2m

1.5 Section Summary and Quiz

Free

2m

10.6 Social Engineering Summary

Free

4m

8.6 Exploring Target Sites Part 1

Free

4m

7.6 Thumbturn Bypass Tools

Free

3m

6.6 Tensioning Locks

Free

2m

5.6 Section Summary and Quiz

Free

4m

1.6 Understanding Threats to the Target

Free

4m

8.7 Exploring Target Sites Part 2

Free

7m

7.7 Section Summary

Free

1m

6.7 How to Pick a Pin Lock

Free

2m

5.7 Methods of Social Engineering Part 1

Free

10m

4.7 Other Types of Equipment

Free

10m

1.7 Legal Questions

Free

6m

10.8 Bypassing Tools and Strategies Summary

Free

5m

8.8 Exploring Target Sites Part 3

Free

5m

7.8 Lock Bypass Tools

Free

1m

6.8 How to Single Pick a Pick Lock

Free

2m

5.8 Methods of Social Engineering Part 2

Free

8m

4.8 Module 4 Summary and Quiz

Free

3m

1.8 Module 1 Summary and Quiz

Free

2m

10.9 Executing a Physical Penetration Test Summary

Free

2m

8.9 Examples of Access Methods Part 1

Free

4m

7.9 Bump Keys

Free

1m

6.9 How to Rake a Pin Lock

Free

4m

5.9 Module 5 Summary and Quiz

Free

4m

10.10 Improving Security Summary

Free

5m

8.10 Examples of Access Methods Part 2

Free

8m

7.10 Lock Bypass Tools - Pick Gun

Free

2m

6.10 Picking Security Pins

Free

5m

8.11 Module Summary and Quiz

Free

5m

7.11 Padlock Shims

Free

5m

6.11 Picking Security Pins Demonstration

Free

5m

7.12 Decoding Combination Locks

Free

10m

6.12 Module 6 Summary and Quiz

Free

2m

7.13 Warded Keys

Free

3m

7.14 Wafer Keys

Free

4m

7.15 Section Summary

Free

1m

7.16 Sensor Bypass Methods

Free

8m

7.17 Section Summary

Free

1m

7.18 Bypass Badge Access

Free

4m

7.19 Bypass Physical Access Controls

Free

2m

7.20 Module 7 Summary and Quiz

Free

4m

10.1 Introduction

0m

Module 10: Summary and Stories
9.1 Limiting Information Exposure

5m

Module 9: Improving Security
8.1 Executing a Physical Penetration Test Introduction

2m

Module 8: Executing a Physical Penetration Test
7.1 Bypassing Tools and Strategies Introduction

2m

Module 7: Bypassing Tools and Strategies
5.1 What is Social Engineering

7m

Module 5: Social Engineering
4.1 Equipment Introduction

2m

Module 4: Types of Equipment
3.1 Information Gathering Methods

7m

Module 3: Information Gathering Methods
1.1 Course introduction

7m

Module 1: Fundamentals of Physical Penetration Testing
8.2 Types of Approaches Introduction

1m

Module 8: Executing a Physical Penetration Test
7.2 Door Bypass Tools Introduction

1m

Module 7: Bypassing Tools and Strategies
5.2 Psychological Concepts Instruction

5m

Module 5: Social Engineering
3.2 IMINT, Electronic Surveillance, Active Recon

7m

Module 3: Information Gathering Methods
4.2 Lock Picks

2m

Module 4: Types of Equipment
2.2 Deterring Risks

5m

Module 2: Planning Phase
1.2 Basics of Physical Penetration Testing

8m

Module 1: Fundamentals of Physical Penetration Testing
10.3 Planning Phase Summary

4m

Module 10: Summary and Stories
8.3 Overt Testing

2m

Module 8: Executing a Physical Penetration Test
7.3 Under the Door Tools

10m

Module 7: Bypassing Tools and Strategies
6.3 Section Summary

1m

Module 6: Lock Picking
Course Description

In this Physical Penetration Testing training course, students will learn the skills needed to identify and exploit physical security weaknesses of an organization. Students will also learn how to make recommendations to resolve physical security issues.

What is Physical Penetration Testing?

Physical Penetration Testing refers to identifying and exploiting the physical security of an organization in order to obtain valuable insights for correcting weaknesses in the company’s security programs and protocols. Physical security can be defined as protecting personnel, software, hardware, networks and data from physical actions and events that could result in loss or damage to an organization.

What Does A Physical Security Pen Tester Certification Entail?

The Physical Penetration Testing training covers topics related to the subject, from the fundamentals to hands-on exploitation methods. Upon completion of this course, students will have a thorough understanding of what physical pentesting is, why it's important, how testing is planned, and how it’s executed. Additionally, students will learn about various types of equipment that physical penetration testers use when performing testing for their organizations. A comprehensive study of social engineering, its psychological concepts, and different methods used by criminals will be covered, as well.

Lastly, the Physical Penetration Testing course will teach students how to use the insights they gain during testing to make recommendations for improving the physical security of their organizations.

What is a Physical Penetration Test?

A physical penetration test is a process in which the tester identifies and exploits vulnerabilities within an organization’s physical barriers and controls. Essentially, it’s a way for organizations to gain insights about their physical security protocols and how to improve them.

The actual testing procedures for physical penetration testing may include things like lock picking doors, piggy backing, bypassing security access controls, hopping fences, and social engineering. Exactly how physical penetration testing is performed may vary between organizations, but it commonly includes investigating areas like:

  • Barriers: this includes hopping fences or bypassing car barriers
  • Door locks: this includes piggy backing into secured areas and bypassing access controls
  • Monitoring techniques: this includes surveillance, cameras, and CCTV techniques, as well as intrusion and motion detection methods
  • Security guard posts and patrols
  • Alarm systems
  • Electronic security equipment: this includes key cards, RFID, biometrics, etc.
  • Mechanical or manual entry points: this includes doors, locks, gates etc.
  • Security lighting
  • Terminal logging policies and procedures
  • Desktop and office security
  • Why Earn the Physical Security Pen Tester Certification?

    The physical security of an organization is crucial. It protects the personnel, data, software, hardware, and networks from being lost or damaged due to the physical actions of criminals. Even though it’s an important part of security auditing in the IT security arena, it’s often overlooked. Many companies use penetration testing to make sure that their digital assets and information are protected from cybercriminals, but they don’t do the same when it comes to physical security threats.

    While protecting digital assets and data is vitally important, they don’t stop an attacker from walking into a facility and stealing an organization's sensitive data from an unlocked computer terminal. Adding physical penetration testing to other penetration testing policies is just as significant.

    Physical penetration testing is an important skillset to bring into organizations for added security of their people, equipment, and networks. Individuals who become trained in physical penetration testing are able to provide another layer of protection to the organizations they work for.

    Physical security pen tester certification has never been easier. Enroll in the Physical Penetration Testing course today.

    DISCLAIMER: This course is intended for learning purposes only. The intention is to teach you physical penetration skills that can be used in your career or to improve security. These skills should not be used for illegal purposes and we condemn anyone doing so.

    Train Your Team

    Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

    Included in a Path

    Instructors

    No items found.
    Learn

    Learn core concepts and get hands-on with key skills.

    Practice

    Exercise your problem-solving and creative thinking skills with security-centric puzzles

    Prove

    Assess your knowledge and skills to identify areas for improvement and measure your growth

    Get Hands-on Learning

    Put your skills to the test in virtual labs, challenges, and simulated environments.

    Measure Your Progress

    Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

    Connect with the Community

    Connect with peers and mentors through our supportive community of cybersecurity professionals.

    Success from Our Learners

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    Physical Penetration Testing

    As a red team member, you may perform physical penetration tests where you identify gaps in physical barriers to show how a threat actor could gain access to sensitive areas or data. Learn the tools and social engineering skills physical pen testers use and how to recommend steps for remediation in this physical penetration testing training.
    6
    47
    M
    Time
    beginner
    difficulty
    7
    ceu/cpe

    Course Content

    Course Description

    In this Physical Penetration Testing training course, students will learn the skills needed to identify and exploit physical security weaknesses of an organization. Students will also learn how to make recommendations to resolve physical security issues.

    What is Physical Penetration Testing?

    Physical Penetration Testing refers to identifying and exploiting the physical security of an organization in order to obtain valuable insights for correcting weaknesses in the company’s security programs and protocols. Physical security can be defined as protecting personnel, software, hardware, networks and data from physical actions and events that could result in loss or damage to an organization.

    What Does A Physical Security Pen Tester Certification Entail?

    The Physical Penetration Testing training covers topics related to the subject, from the fundamentals to hands-on exploitation methods. Upon completion of this course, students will have a thorough understanding of what physical pentesting is, why it's important, how testing is planned, and how it’s executed. Additionally, students will learn about various types of equipment that physical penetration testers use when performing testing for their organizations. A comprehensive study of social engineering, its psychological concepts, and different methods used by criminals will be covered, as well.

    Lastly, the Physical Penetration Testing course will teach students how to use the insights they gain during testing to make recommendations for improving the physical security of their organizations.

    What is a Physical Penetration Test?

    A physical penetration test is a process in which the tester identifies and exploits vulnerabilities within an organization’s physical barriers and controls. Essentially, it’s a way for organizations to gain insights about their physical security protocols and how to improve them.

    The actual testing procedures for physical penetration testing may include things like lock picking doors, piggy backing, bypassing security access controls, hopping fences, and social engineering. Exactly how physical penetration testing is performed may vary between organizations, but it commonly includes investigating areas like:

  • Barriers: this includes hopping fences or bypassing car barriers
  • Door locks: this includes piggy backing into secured areas and bypassing access controls
  • Monitoring techniques: this includes surveillance, cameras, and CCTV techniques, as well as intrusion and motion detection methods
  • Security guard posts and patrols
  • Alarm systems
  • Electronic security equipment: this includes key cards, RFID, biometrics, etc.
  • Mechanical or manual entry points: this includes doors, locks, gates etc.
  • Security lighting
  • Terminal logging policies and procedures
  • Desktop and office security
  • Why Earn the Physical Security Pen Tester Certification?

    The physical security of an organization is crucial. It protects the personnel, data, software, hardware, and networks from being lost or damaged due to the physical actions of criminals. Even though it’s an important part of security auditing in the IT security arena, it’s often overlooked. Many companies use penetration testing to make sure that their digital assets and information are protected from cybercriminals, but they don’t do the same when it comes to physical security threats.

    While protecting digital assets and data is vitally important, they don’t stop an attacker from walking into a facility and stealing an organization's sensitive data from an unlocked computer terminal. Adding physical penetration testing to other penetration testing policies is just as significant.

    Physical penetration testing is an important skillset to bring into organizations for added security of their people, equipment, and networks. Individuals who become trained in physical penetration testing are able to provide another layer of protection to the organizations they work for.

    Physical security pen tester certification has never been easier. Enroll in the Physical Penetration Testing course today.

    DISCLAIMER: This course is intended for learning purposes only. The intention is to teach you physical penetration skills that can be used in your career or to improve security. These skills should not be used for illegal purposes and we condemn anyone doing so.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Physical Penetration Testing Certificate of Completion