Cyber Bootcamp for Black Teams

This rigorous two-day course is designed explicitly for physical penetration testers who need vital cyber skills to add to their toolbox. 

Duration: 2 days
Investment: €1,500
Location: Virtual

Upcoming Courses:
TBA

Learn How to Execute Cyber Operations with Confidence & Skill

After entering a target building, it’s important to know how to use tools like plantable devices, bugs, key loggers, and man-in-the-middle devices to effectively gather data and maintain presence all while not being discovered.

Participants will learn network and wireless penetration testing, including how to scout for information, exploit weaknesses, and access systems without authorization. The course also covers practical techniques such as alarm bypassing to avoid detection by security systems, and provides an introduction to RFID cloning and card reader attacks for manipulating access controls.

The course wraps up with hands-on simulations that challenge you to use both cyber and physical skills effectively. By the end of the course, participants will be better equipped to handle both cyber and physical security challenges and understand how to combine these skills for more comprehensive security assessments.

What You’ll Learn

  • Plan and execute authorized network tests to uncover and validate exploitable paths to critical assets.

  • Assess Wi-Fi security by safely discovering, testing, and validating weaknesses in authentication, segmentation, and coverage.

  • Operate low-profile by managing traffic, timing, and artifacts to reduce detection by common monitoring and logging controls.

  • Understand how adversaries obtain and misuse credentials—and safely simulate those exposures to inform remediation.

  • Systematically map services and configurations to identify, prioritize, and report risk-relevant weaknesses.

  • Analyze how alerting and alarm pathways work, then demonstrate—in controlled scenarios—where detections can fail so defenses can be strengthened.

  • Explain RFID technologies and show, in a lab with owned media, how cloning risks arise and how to mitigate them.

  • Evaluate reader configurations to highlight abuse paths in a controlled environment and drive hardening and procurement standards.

  • Illustrate downgrade risks between card/reader protocols and how to prevent them through configuration and policy.

  • Understand the risks of covert hardware placement and how to detect, monitor, and manage that exposure.

  • Safely simulate egress paths to reveal monitoring blind spots and tune DLP, proxy, and firewall controls.

  • Assess camera ecosystems for misconfiguration and exposure to demonstrate potential pivot risks and recommend secure deployment.

  • Evaluate AP misconfigurations and rogue-AP scenarios to show potential impact and produce concrete hardening guidance.

Certify Your Cyber Skills

After completing the two-day course, students have demonstrated their ability to adeptly use tools such as plantable devices and key loggers for discreet data collection.

They’ve also exhibited skills in network and wireless penetration testing, including reconnaissance and vulnerability exploitation. Additionally, they've shown competence in bypassing alarms and manipulating access controls via RFID cloning. Through hands-on simulations, students have successfully integrated and applied both cyber and physical skills for comprehensive security assessments.

“The cyber security skills course was outstanding. Brian had real-world experience, which added significant value. The hands-on exercises, especially in RFID cloning and attacks, were fantastic. It’s rare to find a course that effectively bridges the gap between cyber and physical security – this one nails it!"

— Amanda R., Security Consultant