No classes scheduled at this time.


Please note that early bird discounts do not apply to Hosted courses.

The cost of this class is inclusive of a $100 equipment fee. All students will leave fully-equipped to perform physical penetration engagements, conduct site survey assessments, and continue their education and skill-building after the course. The security attack and evaluation tools that students keep at the conclusion include: a full lockpicking tool set, a set of 6 custom practice locks, covert jiggler tools, a set of 5 warded lock tools, a traveler hook for door bypassing, a set of bump keys, an EZ decoder, and a comb pick. A small tactical equipment bag is also included to contain all of this field gear. If purchased elsewhere, this hardware would cost well over $175.

A much wider array of tools will be used in this class, and students will be afforded extensive hands-on time with that equipment, as well. Bump hammers, tools for impressioning locks (such as magnifiers, grips, files, and assorted key blanks), specialty bypassing devices for padlocks and door locks, as well as electronic access control attack devices like magnetic search poles, Wiegand protocol interception devices, and Proxmark3 RFID interface hardware will all be made available to students. If a student wishes to retain possession of this larger "extended" set of tools and equipment, this can be arranged during the class for an additional fee.

Physical Security Specialist - Full Comprehensive Edition

Course Syllabus  ·  36 CPEs  ·   Laptop Requirements

Physical Entry Kit

Presented by: The Core Group

Physical security is an oft-overlooked component of data and system security in the technology world. While frequently forgotten, it is no less critical than timely patches, appropriate password policies, and proper user permissions. You can have the most hardened servers and network, but that doesn't make the slightest difference if someone can gain direct access to a keyboard or, worse yet, march your hardware right out the door.

The CORE Group is a firm with divisions that focus on penetration testing, physical defense, personal protection details, and law enforcement training. Those who attend this course will leave with a full awareness of how to best protect buildings and grounds from unauthorized access, as well as how to compromise most existing physical security in order to gain access themselves. Our subject matter experts will immerse you in all the necessary components of a well-layered physical defense system and then teach you how to conduct a thorough site analysis of a facility.

This training is ideal for any individual who is tasked with making physical security decisions for existing or new facilities.

During days One and Two of this course, attendees will not only learn how to distinguish good locks and access control from poor ones, but will also become well-versed in picking and bypassing many of the most common locks in order to assess their own company's security posture or to augment their career as a penetration tester.

On days Three and Four, students will learn to evaluate physical barriers, defensive lighting, doors, external & internal physical intrusion detection systems, camera placement, access controls, and standard operating procedures. They will also be exposed to best practice standards and robust variety of adversarial methodologies used to compromise weak targets such as social engineering and the exploitation of weak employee culture. Numerous in-depth case studies and practical hands-on demonstrations will be utilized to solidify the acquisition of knowledge.

The training concludes on days Five and Six with an intense specialization focus: electronic access control systems and badge readers. Students will be immersed in the world of 125KHz (low frequency) credentials, vehicle transponders, 13.56MHz (high frequency) credentials, and smart cards. Whether an enterprise is using HID Prox cards, NXP Hitag chips, Mifare credentials, or even iCLASS technology, students who have taken this course will be well-versed in the functionality, weaknesses, and attack vectors of such systems. From how to perform practical card cloning attacks in the field to advanced format downgrade attacks, students are prepared for real-world red team scenarios and learn how to exploit access control technology with the latest attack hardware. There are also modules detailing the backend of such systems, which opens the door to Man in the Middle and Denial of Service attacks.

By the end of this course, students will be very prepared to make educated and fiscally-responsible security decisions not only for their respective organizations but also for themselves. Participants will be able to approach any target, site-unseen, and then either conduct a walk through assessment highlighting attack vectors, or proceed directly with an attack... gaining physical access to critical areas and infrastructure. Additionally, these newly-minted professionals in our training will also be able to provide sound documentation while making recommendations to management or to their insurance providers...saving money for their companies.

Electronic Access Control Attack Tools

Course Syllabus

CPE/CMU Credits: 6

CPE/CMU Credits: 6

CPE/CMU Credits: 6

CPE/CMU Credits: 6

CPE/CMU Credits: 6

CPE/CMU Credits: 6

Additional Information

Days Five and Six involve electronic access control systems and the hands-on attacks and defense modules for this section will entail the use of laptops.

For the smoothest possible classroom experience, we ask that students please have laptops running Windows 10 with administrator rights so that all of the software packages will install and operate properly.

If you are not able to secure such a laptop or desperately wish to run an alternate operating system, please email and we'll send information hopefully allowing you to get all the software running.

Please have your laptops with you on Day Four, since the end of the class period that day will be dedicated to double-checking everyone's tech and ensuring that all student laptops will be able to run smoothly on Days Five & Six.

If you have additional questions about the laptop specifications, please contact