- This event has passed.
Practical Physical Exploitation
November 16 @ 9:00 am – 5:00 pm EST
Instructor: Ralph May & Travis Weathers
Course Length: 3 Days, 24 Hours (please note, this is an in-person only class)
Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation.
Clicking on this button will take you to our registration form on Cvent.
Are you a seasoned penetration tester looking to learn how to perform physical security assessments or new to the industry and have collection lockpicks, RFID cloning tools, and other complex hardware that has not been used for anything other than stationary research? Or maybe… Just maybe… You run a red team / penetration testing practice and can’t seem to get a piece of the market share and/or lack a safe, legal, and repeatable testing methodology.
The Practical Physical Exploitation Course is designed to provide you with everything needed to sell and execute physical security assessments. The key word here is PRACTICAL; everything covered in this course is what you need to know to be successful on your first solo assessment. No fluff, no theoretical scenarios, no endless power-point presentations! 90% of your time will be spent honing your skills in live-fire, real-world labs. This is a 9-5 course in a conference room. Be ready to receive late-night CONOPS, sweat, and be placed in uncomfortable situations. Be prepared to have a training experience like no other!
The training concludes with a capabilities exercise (CAPEX) and consultant de-brief. CAPEX? You will perform a physical security assessment on an actual live building at the end of training.
What will you learn while you’re here with us?
- Project Scoping, Legal Protections, Documentation
- Remote Reconnaissance
- Digital Surveillance
- Serupptitous Entry Tactics
- Badge Cloning & Replication
What will you take away?
- New skills that will generate revenue.
- Legal and scoping documents that you and your organization leverage
- New friends
Trainer & Author
Ralph May is a security analyst and penetration tester at Black Hills Information Security. Before joining BHIS, Ralph spent the last five years delivering penetration tests on a wide range of security assessments. These assessments include physical, wireless, network, social engineering, and full simulation red teams. Before focusing on security, Ralph worked as a system administrator and as a network engineer for both civilian and government employers. Ralph is a US Army veteran who previously worked with the United States Special Operations Command (USSOC) on information security challenges and threat actor simulations.
Ralph has contributed to multiple open-source security tools and spoken at numerous security conferences. He’s a lifelong learner and finds joy in discovering how technology truly works. When Ralph is away from the keyboard, he likes the outdoors, boating, exercising, and spending time with his family.
Travis Weathers is a Practice Director on Optiv’s Attack & Penetration team. Since stepping out of the military, he has worked within the offensive security space, performing advanced adversarial emulation assessments and leading offensive security practitioners. Travis is the author of Doppelgänger RFID and has spoken at various conferences, including DEF CON (RF Village), Hack Miami, B-Sides Tampa, and SourceZero Con. Additionally, Travis takes great pride in giving back to the Veteran community through mentorship.