Covert Access Training Course

The CAT (Covert Access Training) course is an immersive, five-day program meticulously crafted to arm students with the practical skills and knowledge indispensable for black team operations.

Duration: 5 days
Investment: €4,000
Location: in-person

Upcoming Courses
March 24-28 | Copenhagen
September 22-26 | TBD (EU)

Learn How to Conduct A Physical Pentest

Students will explore key aspects of physical penetration testing, from assessing access control systems to identifying flaws in door/window exploitation, perimeter security, and surveillance systems. They'll also gain critical skills in social engineering, learning to manipulate human behavior to bypass security. A core part of the training involves risk assessments and vulnerability analysis, helping students pinpoint weaknesses that could lead to unauthorized access.

On the final day, students will conduct a physical engagement of their own, applying everything they’ve learned in a real-world scenario. This hands-on exercise solidifies their ability to assess and improve physical security measures, ensuring they leave with the practical experience needed to excel in physical pentesting.

Through hands-on experience, participants are guided through essential techniques and strategies for covert infiltration, preparing them for success in the world of black team engagements. With a focus on real-world application, this course serves as a launchpad for professionals eager to make their mark in the security domain.

What You’ll Learn

  • Participants will learn how to manipulate lock mechanisms to gain access, using both traditional and specialized tools for discreet entry.

  • Participants will gain the skills to navigate and exploit master keying and keyed alike systems, enabling them to operate multiple locks with a single key and understand the complexities of hierarchical and uniform key access setups.

  • Participants will learn key and lock impressioning techniques to gain persistent access at a client site by creating duplicate keys without detection.

  • Participants will learn how to bypass physical security measures on doors and windows, such as manipulating locks, removing barriers, or exploiting weaknesses to gain covert entry without causing damage.

  • Participants will learn to identify and bypass various alarm systems by understanding their components and vulnerabilities, enabling them to discreetly disable or circumvent security measures to gain unauthorized access.

  • Participants will learn to identify and exploit vulnerabilities in access control systems, including card readers and electronic locks, to gain unauthorized access without detection.

  • Participants will learn to clone ID badges by extracting and replicating data from RFID-enabled cards, enabling unauthorized access to secure areas without detection.

  • Participants will learn to identify and exploit vulnerabilities in Physical Access Control Systems (PACS) readers, enabling unauthorized access without detection.

  • Participants will learn techniques for scaling buildings and overcoming physical obstacles, allowing them to navigate vertical and horizontal barriers to gain covert access to secure areas.

  • Participants will learn social engineering techniques to influence individuals into providing access or divulging confidential information.

  • Participants will learn elicitation techniques to subtly gather sensitive information through conversation, focusing on extracting details without raising suspicion

  • Participants will learn counter-elicitation techniques to recognize and resist attempts to gather sensitive information through subtle questioning

  • Participants will learn how to plan and execute covert operations as part of a Black Team, focusing on the strategic approach to testing and bypassing security systems while maintaining operational security and stealth.

  • Participants will learn how to conduct thorough target site reconnaissance, gathering critical information about a location’s layout, security measures, and vulnerabilities to plan a successful covert access operation.

  • Participants will learn long-range reconnaissance techniques to gather intelligence from a distance, using surveillance methods to monitor target sites and assess security measures without alerting the target.

  • Participants will learn embedded reconnaissance techniques to gather intelligence by blending into the environment or using covert means to monitor a target site from within, without raising suspicion.

  • Participants will learn how to deploy bugging and plantable devices to secretly gather audio, video, or data from a target site, enhancing their ability to monitor and exploit environments covertly.

  • Participants will learn destructive entry techniques to bypass physical security barriers by forcefully breaching doors, windows, or other entry points when stealth and non-destructive methods are not viable.

Get Certified As A Covert Access Specialist

Students who have successfully completed the Covert Access Training course and earned their CAT certification have demonstrated comprehensive skill sets in evaluating and exploiting physical security measures. 

Holders of the CAT certification have conducted a successful Black Team engagement where they demonstrated experience in lock picking and bypass methods for thwarting various intrusion defense mechanisms. They are well-versed in electronic access controls, including RFID systems, understand surveillance systems and posses techniques to evade or disable cameras and sensors. They have demonstrated their social engineering skills, enabling them to exploit human factors effectively, and have also demonstrated the ability to assess physical infrastructures and pinpoint security vulnerabilities.

Read What Past Students Have To Say

"I love that we got hands-on practice with the tools all week long."

|

"The physical engagement on the last day really showed how much we learned."

|

"This is the best course I've taken to date!"

|

"I love that we got hands-on practice with the tools all week long." | "The physical engagement on the last day really showed how much we learned." | "This is the best course I've taken to date!" |

FAQs

  • The Covert Access Training course provides advanced, hands-on instruction in bypassing physical security systems, including lockpicking, alarm system bypassing, social engineering, and other covert access techniques, all aimed at improving operational security and stealth.

  • This course is designed for professionals in corporate security, law enforcement, and private investigation sectors who need to understand and test physical security vulnerabilities in a controlled and ethical manner.

  • No prior experience is required. Participants will come into the course with varying levels of knowledge, and some may already be familiar with one or several of the topics covered. However, all topics will be taught from the ground up, ensuring that everyone, regardless of experience level, has the foundational skills needed to succeed.

  • Participants will learn hands-on techniques in lockpicking, alarm bypassing, social engineering, ID badge cloning, and more, all focused on gaining covert access to secure areas without detection.

  • The course is highly hands-on, providing participants with practical exercises and real-world scenarios to test and apply the skills they are learning in a controlled, professional environment.

  • All necessary equipment, such as lockpicking tools, ID cloning devices, and other specialized tools, will be provided during the course. Participants may also be encouraged to bring their own tools if they prefer.

  • The course is typically conducted over a span of four days, with both theory and practical application sessions, ensuring participants have ample time to develop and refine their skills. The fifth and final day is a physical engagement to apply what we’ve learned the rest of the week.

  • Yes, participants will receive a certificate of completion upon successful completion of the course, demonstrating their proficiency in covert access and physical security testing.

  • Absolutely. The techniques taught in this course are directly applicable to real-world security assessments, allowing participants to test and evaluate physical security systems for vulnerabilities.

  • This course emphasizes ethical behavior and legal boundaries. All techniques taught are intended for use in legitimate security assessments, investigations, or authorized penetration testing. Participants are expected to adhere to all legal and ethical standards when applying the skills learned.

Enroll in an Upcoming CAT Course

Covert Access Training (March 2025)
€4,000.00

SOLD OUT

Covert Access Training (September 2025)
€4,000.00

If you would to pay by invoice, please email brian@covertaccessteam.com.

Wish to be notified when we announce our 2026 course calendar? Want to plan a private CAT course for your team?

“As a police officer, the Covert Access Training has been very useful for my day-to-day operations. The ability to gain entry into buildings swiftly, without resorting to force or causing damage, is invaluable. This training has equipped me with an array of non-destructive techniques that not only uphold the integrity of properties but also maximize operational efficiency. It's gratifying to know that I can ensure safety and security in a more discreet and respectful manner. Highly recommended for fellow officers who want to augment their skillset.”

— Peter, former student