
“Breaking in: Physical Intrusion & Social Engineering Tradecraft” is a two-day, in-person training that teaches students how to plan and execute physical social engineering assessments with a professional red team mindset.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date:
Notify me when available
Description
“Breaking in: Physical Intrusion & Social Engineering Tradecraft” is a two-day, in-person training that teaches students how to plan and execute physical social engineering assessments with a professional red team mindset.
Students will learn how to approach physical intrusion work through client objectives, OSINT, hostile surveillance, pretext development, social engineering psychology, real-time adaptation, and meaningful control validation.
This class focuses on how to think through the full engagement lifecycle, from research and planning through approach strategy, challenged interactions, assumed-breach pivots, debriefing, and reporting. Students will learn how to build believable pretexts, read human behavior, adapt under pressure, and align “getting in” with what the client actually needs tested.
The goal is not just to collect trophies. The goal is to test the right controls, answer the right questions, and produce findings that help organizations improve.
-
System Requirements/Students Should Bring
- Laptop with Wi-Fi capability
- Modern web browser
- Note-taking application or notebook
- Mobile phone with camera
- Comfortable clothing for light practical exercises
- No specialized hardware is required. Students do not need RFID tools, physical bypass tools such as lockpicks, badge cloning hardware, or exploit tooling.
Syllabus
Day 1: Planning, Psychology, OSINT, and Pretext Development
- Physical intrusion mindset and engagement strategy
- Defining client objectives and meaningful test outcomes
- Social engineering psychology and influence principles
- OSINT for physical and social engineering engagements
- Hostile surveillance and site reconnaissance
- Building believable pretexts
- Stress-testing pretexts before execution
Day 2: Execution, Adaptation, and Reporting
- Approach and entry strategy
- Real-time social engineering and challenge handling
- Adapting when a pretext starts to slip
- Converting to assumed breach when exterior access is blocked
- Aligning trophies with client testing goals
- Practical exercises and group scenarios
- Debriefing, evidence collection, and reporting findings
FAQ
Beginner to intermediate.
The class is accessible to students who are new to physical social engineering, but it is also useful for security practitioners, red teamers, consultants, and defenders who want a stronger methodology for planning and executing physical intrusion assessments.
- Basic understanding of security assessments or red team concepts
- Interest in social engineering, OSINT, physical security, or adversarial testing
- Willingness to participate in discussion and practical exercises
- No prior physical intrusion experience is required.
- Red teamers
- Social engineers
- Physical security testers
- Penetration testers expanding into physical or human-focused testing
- Security consultants
- Internal security teams
- Blue teamers and defenders
- GRC, security awareness, and security leadership professionals who want to better understand how physical and human controls are tested
Students will learn how to:
-
Plan physical social engineering engagements around client objectives
-
Use OSINT and surveillance to support the test plan
-
Build believable and flexible pretexts
-
Apply social engineering psychology during real-world interactions
-
Recognize when a pretext is working, slipping, or no longer useful
-
Adapt during challenged interactions
-
Convert blocked exterior attempts into assumed-breach testing when appropriate
-
Align “trophies” with meaningful control validation
-
Debrief and report physical/social engineering findings clearly
Most physical intrusion training focuses on tricks, war stories, or getting the biggest trophy. This class teaches students how to think and operate like a professional physical red teamer.
Students will learn how to research a target, build a believable pretext, conduct hostile surveillance, approach a facility, adapt under pressure, and keep the test aligned with the client’s actual security objectives.
About the Instructor
Alethe Denis
Bio
Alethe Denis is a Senior Security Consultant II at Bishop Fox specializing in red team social engineering, physical security bypass, and open-source intelligence (OSINT). With extensive experience conducting security assessments for both private and public sector organizations — including critical infrastructure — she brings a rare combination of technical depth and human-focused attack simulation to every engagement.
Alethe developed and owns Bishop Fox’s Tabletop Facilitation service line, designing realistic, scenario-driven exercises that help organizations stress-test their incident response capabilities.
A recognized leader in the DEF CON community, Alethe serves as Global DEF CON Groups Coordinator and Deputy Lead for DEF CON Groups Singapore, working to grow and support the international security community. She earned a DEF CON Black Badge at DEF CON 27 after winning the 10th annual Social Engineering Capture the Flag (SECTF) contest, compromising a Fortune 500 target using only a telephone. She and her teammates have also earned bronze, silver, Most Valuable OSINT, and Black Badge awards across multiple TraceLabs capture-the-flag competitions, including first place in the August 2020 DEF CON edition of the TraceLabs Missing Persons OSINT CTF.
Alethe has appeared on the “Darknet Diaries” podcast and has taken the stage at venues as varied as San Diego Comic-Con and the DEF CON main stage. She regularly supports conferences throughout the year with talks and workshops.
Related products
-
Multiple InstructorsLive16 Hrs
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel
View Course -
Multiple InstructorsLive24 Hrs
Practical Physical Exploitation
View Course -
Chris TraynorLiveOD8 Hrs
Offensive Tooling Foundations
View Course This product has multiple variants. The options may be chosen on the product page -
Tim MedinLive16 Hrs
Penetration Testing: Beyond the Basics
View Course

