Free

Physical Penetration Testing

As a red team member, you may perform physical penetration tests where you identify gaps in physical barriers to show how a threat actor could gain access to sensitive areas or data. Learn the tools and social engineering skills physical pen testers use and how to recommend steps for remediation in this physical penetration testing training.
6
47
M
Time
beginner
difficulty
7
ceu/cpe

Course Content

7.20 Module 7 Summary and Quiz

4m

Module 7: Bypassing Tools and Strategies
7.19 Bypass Physical Access Controls

2m

Module 7: Bypassing Tools and Strategies
7.18 Bypass Badge Access

4m

Module 7: Bypassing Tools and Strategies
7.17 Section Summary

1m

Module 7: Bypassing Tools and Strategies
7.16 Sensor Bypass Methods

8m

Module 7: Bypassing Tools and Strategies
7.15 Section Summary

1m

Module 7: Bypassing Tools and Strategies
7.14 Wafer Keys

4m

Module 7: Bypassing Tools and Strategies
7.13 Warded Keys

3m

Module 7: Bypassing Tools and Strategies
7.12 Decoding Combination Locks

10m

Module 7: Bypassing Tools and Strategies
7.11 Padlock Shims

5m

Module 7: Bypassing Tools and Strategies
7.10 Lock Bypass Tools - Pick Gun

2m

Module 7: Bypassing Tools and Strategies
7.9 Bump Keys

1m

Module 7: Bypassing Tools and Strategies
7.8 Lock Bypass Tools

1m

Module 7: Bypassing Tools and Strategies
7.7 Section Summary

1m

Module 7: Bypassing Tools and Strategies
7.6 Thumbturn Bypass Tools

3m

Module 7: Bypassing Tools and Strategies
7.5 Crash Bar Tools

2m

Module 7: Bypassing Tools and Strategies
7.4 Door Shimming Tools

3m

Module 7: Bypassing Tools and Strategies
7.3 Under the Door Tools

10m

Module 7: Bypassing Tools and Strategies
7.2 Door Bypass Tools Introduction

1m

Module 7: Bypassing Tools and Strategies
7.1 Bypassing Tools and Strategies Introduction

2m

Module 7: Bypassing Tools and Strategies
6.12 Module 6 Summary and Quiz

2m

Module 6: Lock Picking
6.10 Picking Security Pins

5m

Module 6: Lock Picking
6.9 How to Rake a Pin Lock

4m

Module 6: Lock Picking
Course Description

In this Physical Penetration Testing training course, students will learn the skills needed to identify and exploit physical security weaknesses of an organization. Students will also learn how to make recommendations to resolve physical security issues.

What is Physical Penetration Testing?

Physical Penetration Testing refers to identifying and exploiting the physical security of an organization in order to obtain valuable insights for correcting weaknesses in the company’s security programs and protocols. Physical security can be defined as protecting personnel, software, hardware, networks and data from physical actions and events that could result in loss or damage to an organization.

What Does A Physical Security Pen Tester Certification Entail?

The Physical Penetration Testing training covers topics related to the subject, from the fundamentals to hands-on exploitation methods. Upon completion of this course, students will have a thorough understanding of what physical pentesting is, why it's important, how testing is planned, and how it’s executed. Additionally, students will learn about various types of equipment that physical penetration testers use when performing testing for their organizations. A comprehensive study of social engineering, its psychological concepts, and different methods used by criminals will be covered, as well.

Lastly, the Physical Penetration Testing course will teach students how to use the insights they gain during testing to make recommendations for improving the physical security of their organizations.

What is a Physical Penetration Test?

A physical penetration test is a process in which the tester identifies and exploits vulnerabilities within an organization’s physical barriers and controls. Essentially, it’s a way for organizations to gain insights about their physical security protocols and how to improve them.

The actual testing procedures for physical penetration testing may include things like lock picking doors, piggy backing, bypassing security access controls, hopping fences, and social engineering. Exactly how physical penetration testing is performed may vary between organizations, but it commonly includes investigating areas like:

  • Barriers: this includes hopping fences or bypassing car barriers
  • Door locks: this includes piggy backing into secured areas and bypassing access controls
  • Monitoring techniques: this includes surveillance, cameras, and CCTV techniques, as well as intrusion and motion detection methods
  • Security guard posts and patrols
  • Alarm systems
  • Electronic security equipment: this includes key cards, RFID, biometrics, etc.
  • Mechanical or manual entry points: this includes doors, locks, gates etc.
  • Security lighting
  • Terminal logging policies and procedures
  • Desktop and office security
  • Why Earn the Physical Security Pen Tester Certification?

    The physical security of an organization is crucial. It protects the personnel, data, software, hardware, and networks from being lost or damaged due to the physical actions of criminals. Even though it’s an important part of security auditing in the IT security arena, it’s often overlooked. Many companies use penetration testing to make sure that their digital assets and information are protected from cybercriminals, but they don’t do the same when it comes to physical security threats.

    While protecting digital assets and data is vitally important, they don’t stop an attacker from walking into a facility and stealing an organization's sensitive data from an unlocked computer terminal. Adding physical penetration testing to other penetration testing policies is just as significant.

    Physical penetration testing is an important skillset to bring into organizations for added security of their people, equipment, and networks. Individuals who become trained in physical penetration testing are able to provide another layer of protection to the organizations they work for.

    Physical security pen tester certification has never been easier. Enroll in the Physical Penetration Testing course today.

    DISCLAIMER: This course is intended for learning purposes only. The intention is to teach you physical penetration skills that can be used in your career or to improve security. These skills should not be used for illegal purposes and we condemn anyone doing so.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Dustin Parry

    My current role is a network security engineer but like many of us in security, I wear many hats. I perform forensics, threat and network hunting, intel, malware analysis and remediation, vulnerability scanning and management, red teaming, along with helping to write and rewrite policies and guidelines.

    I’ve been in IT for over 10 years, everything from help desk, networking, hardware repair, and I finally moved into a security role a few years ago. One of my favorite things to do is phishing simulations.

    I grew up always interested in figuring out how things work and how to make them work in ways that may not have been intended. I graduated with my Bachelor’s in IT - Security in 2018 from Western Governors University. There I earned many industry certifications, including Comptia’s A+, Net+, Sec+, Linux+, Cisco CCENT, CCNA and CCNA Security, several CIW certs, LPIC-1 and the Infosec 4011. I’ve also been working towards my OSCP now that I’ve got a little more free time. When I’m not working in security, listening to security podcasts or researching the newest threats, I’m usually spending time with my daughter, taking photos or working on old cars. I love to hike and enjoy the outdoors as much as possible.

    Instructor
    Shawn Briere

    Before I worked in the cyber security I was a psychologist. I have always been

    interested in how humans think and react to different situations. In my time at

    the University of Arizona I majored in psychology and was particularly fascinated

    in social psychology. I took all the classes the university had to offer in social

    psychology and became a research assistant for one of the social psychology

    professor. After college, I began working in several roles related to my degree

    including as a counselor for the mentally ill. After about 5 years I decided to

    switch careers into cyber security. I went back to school and got a few

    certifications, including a CCNA and a Security+. After finding a job, I worked my

    way up very quickly in my current company and got promoted into a role in the IT

    security department. Although psychology and cyber security may appear

    different, the two fields compliment themselves well because many attacks and

    attackers rely on techniques borrowed from psychology. Due to my background in

    psychology, learning how attacks against machines and humans that control those

    machines came very easy to me. Today I use my previous experience in

    psychology to help me in my current role to look for attacks and stop them.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Physical Penetration Testing Certificate of Completion