Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Physical Penetration Testing

via Cybrary

Overview

In this Physical Penetration Testing training course, students will learn the skills needed to identify and exploit physical security weaknesses of an organization. Students will also learn how to make recommendations to resolve physical security issues.

What is Physical Penetration Testing?

Physical Penetration Testing refers to identifying and exploiting the physical security of an organization in order to obtain valuable insights for correcting weaknesses in the company’s security programs and protocols. Physical security can be defined as protecting personnel, software, hardware, networks and data from physical actions and events that could result in loss or damage to an organization.

What Does A Physical Security Pen Tester Certification Entail?

The Physical Penetration Testing training covers topics related to the subject, from the fundamentals to hands-on exploitation methods. Upon completion of this course, students will have a thorough understanding of what physical pentesting is, why it's important, how testing is planned, and how it’s executed. Additionally, students will learn about various types of equipment that physical penetration testers use when performing testing for their organizations. A comprehensive study of social engineering, its psychological concepts, and different methods used by criminals will be covered, as well.

Lastly, the Physical Penetration Testing course will teach students how to use the insights they gain during testing to make recommendations for improving the physical security of their organizations.

What is a Physical Penetration Test?

A physical penetration test is a process in which the tester identifies and exploits vulnerabilities within an organization’s physical barriers and controls. Essentially, it’s a way for organizations to gain insights about their physical security protocols and how to improve them.

The actual testing procedures for physical penetration testing may include things like lock picking doors, piggy backing, bypassing security access controls, hopping fences, and social engineering. Exactly how physical penetration testing is performed may vary between organizations, but it commonly includes investigating areas like:

  • Barriers: this includes hopping fences or bypassing car barriers
  • Door locks: this includes piggy backing into secured areas and bypassing access controls
  • Monitoring techniques: this includes surveillance, cameras, and CCTV techniques, as well as intrusion and motion detection methods
  • Security guard posts and patrols
  • Alarm systems
  • Electronic security equipment: this includes key cards, RFID, biometrics, etc.
  • Mechanical or manual entry points: this includes doors, locks, gates etc.
  • Security lighting
  • Terminal logging policies and procedures
  • Desktop and office security

Why Earn the Physical Security Pen Tester Certification?

The physical security of an organization is crucial. It protects the personnel, data, software, hardware, and networks from being lost or damaged due to the physical actions of criminals. Even though it’s an important part of security auditing in the IT security arena, it’s often overlooked. Many companies use penetration testing to make sure that their digital assets and information are protected from cybercriminals, but they don’t do the same when it comes to physical security threats.

While protecting digital assets and data is vitally important, they don’t stop an attacker from walking into a facility and stealing an organization's sensitive data from an unlocked computer terminal. Adding physical penetration testing to other penetration testing policies is just as significant.

Physical penetration testing is an important skillset to bring into organizations for added security of their people, equipment, and networks. Individuals who become trained in physical penetration testing are able to provide another layer of protection to the organizations they work for.

Physical security pen tester certification has never been easier. Enroll in the Physical Penetration Testing course today.

DISCLAIMER: This course is intended for learning purposes only. The intention is to teach you physical penetration skills that can be used in your career or to improve security. These skills should not be used for illegal purposes and we condemn anyone doing so.

Syllabus

  • Module 1: Fundamentals of Physical Penetration Testing
    • 1.1 Course introduction
    • 1.2 Basics of Physical Penetration Testing
    • 1.3 Common Terms
    • 1.4 Why Get a Physical Penetration Test?
    • 1.5 Section Summary and Quiz
    • 1.6 Understanding Threats to the Target
    • 1.7 Legal Questions
    • 1.8 Module 1 Summary and Quiz
  • Module 2: Planning Phase
    • 2.1 Receiving the Old Job and Rules of Engagement
    • 2.2 Deterring Risks
    • 2.3 Info Gathering, Planning, Equipment, Communication, and Docs
    • 2.4 Assembling an Operations Team
    • 2.5 Module 2 Summary and Quiz
  • Module 3: Information Gathering Methods
    • 3.1 Information Gathering Methods
    • 3.2 IMINT, Electronic Surveillance, Active Recon
    • 3.3 Information Gathering Labs
    • 3.4 Module 3 Summary and Quiz
  • Module 4: Types of Equipment
    • 4.1 Equipment Introduction
    • 4.2 Lock Picks
    • 4.3 Bypass Tools
    • 4.4 Introduction to Specialized Hacking Tools
    • 4.5 Specialized Hacking Tools Part 1
    • 4.6 Specialized Hacking Tools Part 2
    • 4.7 Other Types of Equipment
    • 4.8 Module 4 Summary and Quiz
  • Module 5: Social Engineering
    • 5.1 What is Social Engineering
    • 5.2 Psychological Concepts Instruction
    • 5.3 Six Key Principles of Influence Part 1
    • 5.4 Six Key Principles of Influence Part 2
    • 5.5 Additional Principles of Influence
    • 5.6 Section Summary and Quiz
    • 5.7 Methods of Social Engineering Part 1
    • 5.8 Methods of Social Engineering Part 2
    • 5.9 Module 5 Summary and Quiz
  • Module 6: Lock Picking
    • 6.1 What is Lock Picking and Basics of a Pin Lock
    • 6.2 Basics of Other Common Locks
    • 6.3 Section Summary
    • 6.4 Picking Pin Locks Introduction
    • 6.5 Basics of a Lock Picking Set
    • 6.6 Tensioning Locks
    • 6.7 How to Pick a Pin Lock
    • 6.8 How to Single Pick a Pick Lock
    • 6.9 How to Rake a Pin Lock
    • 6.10 Picking Security Pins
    • 6.11 Picking Security Pins Demonstration
    • 6.12 Module 6 Summary and Quiz
  • Module 7: Bypassing Tools and Strategies
    • 7.1 Bypassing Tools and Strategies Introduction
    • 7.2 Door Bypass Tools Introduction
    • 7.3 Under the Door Tools
    • 7.4 Door Shimming Tools
    • 7.5 Crash Bar Tools
    • 7.6 Thumbturn Bypass Tools
    • 7.7 Section Summary
    • 7.8 Lock Bypass Tools
    • 7.9 Bump Keys
    • 7.10 Lock Bypass Tools - Pick Gun
    • 7.11 Padlock Shims
    • 7.12 Decoding Combination Locks
    • 7.13 Warded Keys
    • 7.14 Wafer Keys
    • 7.15 Section Summary
    • 7.16 Sensor Bypass Methods
    • 7.17 Section Summary
    • 7.18 Bypass Badge Access
    • 7.19 Bypass Physical Access Controls
    • 7.20 Module 7 Summary and Quiz
  • Module 8: Executing a Physical Penetration Test
    • 8.1 Executing a Physical Penetration Test Introduction
    • 8.2 Types of Approaches Introduction
    • 8.3 Overt Testing
    • 8.4 Covert Testing
    • 8.5 Unseen Testing
    • 8.6 Exploring Target Sites Part 1
    • 8.7 Exploring Target Sites Part 2
    • 8.8 Exploring Target Sites Part 3
    • 8.9 Examples of Access Methods Part 1
    • 8.10 Examples of Access Methods Part 2
    • 8.11 Module Summary and Quiz
  • Module 9: Improving Security
    • 9.1 Limiting Information Exposure
    • 9.2 Defending Against Social Engineering Attacks
    • 9.3 Data Deconstruction Against Electronic Monitoring
    • 9.4 Module 9 Summary and Quiz
  • Module 10: Summary and Stories
    • 10.1 Introduction
    • 10.2 Fundamentals of Penetration Testing Summary
    • 10.3 Planning Phase Summary
    • 10.4 Information Gathering Summary
    • 10.5 Types of Equipment Summary
    • 10.6 Social Engineering Summary
    • 10.7 Lock Picking Summary
    • 10.8 Bypassing Tools and Strategies Summary
    • 10.9 Executing a Physical Penetration Test Summary
    • 10.10 Improving Security Summary
  • Course Assessment
    • Course Assessment - Physical Penetration Testing

Taught by

Shawn Briere and Dustin Parry

Reviews

Start your review of Physical Penetration Testing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.