In this workshop, you will learn how to:
The workshop includes practical exercises where participants will have the opportunity to put theory into practice in a real-world setting.
This workshop is perfect for individuals who conduct physical intrusion tests and seek to further develop their practical knowledge and skills.
There are no strict pre-requisites for this workshop. However, participants will benefit by attending the Planning a Physical Intrusion Test workshop and the Risk Management and Safety for Physical Intrusion Tests workshop.
After completing this workshop, participants should consider attending the Risk Management and Safety for Physical Intrusion Tests workshop to continue their professional development.
Participants will receive a comprehensive set of workshop notes, additional resources, and a curated toolkit for surveillance and reconnaissance in physical intrusion testing. This toolkit includes checklists and templates. Note-taking during the workshop is encouraged.
Your instructor for this workshop has 35 years of security experience in a combination of government, corporate security, and security consulting roles. He has conducted numerous physical intrusion tests, including tests against high-security facilities within the region. He has written multiple articles on the topic of physical intrusion testing.
This workshop can be conducted remotely via video or in-person at your office. To ensure an optimal learning experience, remote sessions have a limit of 8 to 18 participants.
Our informal training format encourages questions and fosters knowledge-sharing among peers.
We offer remote workshops via Zoom or in-person sessions at your office. Detailed instructions for using Zoom will be provided in advance.
The workshop will be delivered in English, and all training materials will also be in English.
No formal assessment is required for this workshop. All participants who attend the full session will receive a certificate of completion.
We offer post-workshop support, such as follow-up consultations or email support, to address any questions or concerns that may arise after the workshop. This additional support can help reinforce the lessons learned and ensure the successful application of workshop concepts in real-life scenarios.
Pricing varies for remote and in-person training. Contact us for an exact quote based on your needs.
Discounts are available for clients booking multiple workshops within a calendar year or scheduling recurring quarterly, half-yearly, or annual workshops for their teams.
To book this workshop for your organization, please register your interest using the button below.
Include the number of participants, preferred date and time, and your desired venue for in-person training.
For online training, we maintain a maximum of 18 participants per workshop to ensure an optimal learning environment.Register your interest now
Our training is primarily targeted at organisations. However, if you are interested in participating in this training workshop as an individual, please complete this questionnaire. If we receive enough interest in a specific workshop, we'll consider setting up a special sessions.
How to gain entry to some facilities without defeating existing security systems, simply by taking advantage of poor security design.
26 Jan 2022 · Read now
How you can integrate distractions and diversions into your physical intrusion tests to enable you to access the facility and achieve your objectives.
25 Jan 2022 · Read now
Exploring the different aspects of safety you should consider during your physical intrusion tests
27 Dec 2021 · Read now
When to use overwatch, how to position overwatch, and how to communicate with overwatch during an intrusion.
22 Dec 2021 · Read now
How to integrate surveillance and reconnaissance into your physical intrusion tests.
06 Aug 2021 · Read now
Exploring the value of testing multiple layers of security during an intrusion test.
23 Jul 2021 · Read now
Why it's important to model a specific threat when conducting physical intrusion tests, and how to go about the process of establishing a valid threat model.
22 Jul 2021 · Read now