- Introduction
- Covert Entry Concepts
- Pin Tumbler Locks
- Operation
- Manipulation
- Tools & Techniques
- Hands-On Lab
- Ethics and the Law
- Pick Resistant Locks
- Lock & Key Decoding
- Key Decoding
- Lock Removal
- Lock Decoding
- Specialized Tools
- Hands-On Lab
- Wafer Locks
- Warded Locks
- Tubular Locks
- Cruciform Locks
- Tamper-Resistant Fasteners
- Lock Bumping
- Producing Keys
- Duplication
- Origination
- Disabling Keys
- Key Control
- Restricted Keyways
- Hands-On Lab
|
- Combination Locks
- Multi-Wheel Decoding
- Hands-On Lab
- Pushbutton Decoding
- Key Storage Boxes
- Padlock Bypassing
- Shimming
- Hands-On Lab
- Sesamee Bypassing
- Hands-On Lab
- Comb Overlifting
- Hands-On Lab
- Unshielded Padlocks
- Hands-On Lab
- Bypass Drivers
- Hands-On Lab
- Door Bypassing - Latches & Boltwork
- Loiding Tools
- Commercial Deadlatches
- Commercial Deadbolts
- Hands-On Lab
- Door Bypassing - Handle Controls
- Magnetic Bypassing
- Euro Turner Bypassing
- Door Bypassing - Egress Controls
- Under Door Attacks
- Panic Hardware Triggering
- Hands-On Lab
- Door Bypassing - Residential Considerations
- Windows
- Mail Slots
- Garage Doors
- Key Impressioning
- Master-Keyed Systems
|
- Elevator Security
- RFID Access Controls
- Sensors and Alarms
- The Proxmark Device
- Credential Simulation and Cloning Attacks
- Wiegand Backhaul Interception
- Weaponizing Commercial Readers
- PIN Codes
- Access Control Systems in the Field
|
- Telephony Access Control Systems
- Keyed-Alike Systems
- Reconnaissance & Surveillance
- Fences & Barriers
- Covert Photography
- Drones & UAVs
- Hands-On Lab
- Photographic Key Decoding
- Social Engineering
- Locksmith Software and Tools
- Default Codes
- Destructive Entry
|
- Mold & Cast Attacks
- Field Expedient Tool Fabrication
- Forensics
- Covert Entry Process & Target Approach
- Security in the Field
- Conclusion & Review
Day Five includes an extra block of free, unstructured time where students may re-visit any of the previous modules from the class or ask additional questions for deeper dives into topics.
This block of time also serves as a buffer in case any previous module ran long, to ensure that nothing needs to be dropped from this course due to time constraints.
|