JUSTIFICATION AND OVERVIEW:
Modern physical security is too often judged by the presence of cameras, guards, and locked doors—but these measures mean little if not tested against determined, informed, and creative adversaries.
Government facilities, critical infrastructure, and corporate sites all face growing threats from individuals or teams capable of bypassing physical controls through a blend of deception, social engineering, and covert techniques.
Red teaming is not just about breaching security; it’s about identifying and exploiting gaps in systems, procedures, and human behavior to improve defensive posture. This course focuses on Basic Red Teaming & Covert Entry, giving personnel a solid grounding in ethical intrusion, vulnerability assessment, and the tradecraft used by real-world attackers.
Tailored for those in law enforcement, military, intelligence, or government security teams, this course emphasises legally sanctioned operations that simulate adversarial behavior to test readiness. Students will develop foundational skills in reconnaissance, entry tool use, lock bypass, and real-time decision-making under operational constraints.
The course is taught by experienced red team operators with backgrounds in government, special operations, and physical penetration testing. While it avoids advanced or illegal techniques, it provides a professional baseline suitable for supporting physical assessments, protective intelligence operations, and insider threat investigations.
BOTTOM LINE UP FRONT:
This course provides a hands-on foundation in red teaming and covert physical entry. Students will learn to plan, execute, and report on physical security tests using legal, ethical, and realistic tradecraft in support of national or organisational security objectives.
CONDITIONS OF ENTRY:
This course is restricted to government, law enforcement, military, or authorised defense contractor personnel. All students must sign an agreement acknowledging lawful training conditions and non-disclosure of tools or techniques to unauthorised parties. Participants should be physically able to participate in light movement and fieldwork activities. This course does not teach illegal access or lock picking for criminal purposes and will be cancelled for any non-vetted commercial attendees.
INDICATIVE COURSE CONTENT:
Module 1: Introduction to Red Teaming & Threat Emulation
• Red vs. Blue vs. Purple Teams: Definitions and mission roles
• Types of threat actors and physical attack scenarios
• Legal & ethical frameworks for authorised entry operations
Module 2: Reconnaissance and Target Profiling
• Open-source intelligence (OSINT) for physical security targets
• Entry timing, surveillance, and identifying patterns of life
• Assessing guard routines, badge behavior, and human vulnerabilities
Module 3: Tools of the Trade – Covert Entry Foundations
• Introduction to basic entry tools (shims, underdoor tools, bump keys)
• Lock identification and bypass theory (pin tumbler, wafer, tubular)
• Using environmental tools (access cards, magnets, ID spoofing)
Module 4: Infiltration Tactics & Deception
• Disguise, pretexting, and blending in
• Visitor access manipulation and tailgating
• Use of social engineering in physical access
Module 5: Entry Execution & Documentation
• Planning and briefing a red team physical assessment
• Entry team roles and communication
• Evidence collection, photography, and report writing
top of page
$7,700.00Price
bottom of page