About Us
Elevate Your Skills. Challenge Your Limits.
Who We Are
At Practical Physical Exploitation (PPE), we believe that the best way to understand and counteract a threat is to get hands-on with it. We are a team of experienced red teamers and information security professionals who have come together to create an intensive training environment where participants can experience real-world challenges in a controlled setting.
Our Mission
To offer immersive, real-world training that prepares red teams and information security enthusiasts with the essential skills to effectively evaluate and fortify physical environments.
Course Cadre
Ralph May
Ralph is a security analyst and penetration tester at Black Hills Information Security and a co-owner of Mayweather Group, LLC, the creator of the Practical Physical Exploitation Course and the Physical Exploitation Store. Before joining BHIS, Ralph spent five years performing offensive operations on a wide range of security assessments. These assessments include physical, wireless, network, social engineering, and full simulation red teams. Before focusing on security, Ralph worked as a system administrator and network engineer for civilian and government employers. Ralph is a US Army veteran who previously worked with the United States Special Operations Command (USSOCOM) on information security challenges and threat actor simulations. Additionally, Ralph has been published in PROMPT# Zine ("Better Together" comic).
Travis Weathers
Travis is the Senior Director of Offensive Security at Echelon Risk + Cyber and a co-owner of Mayweather Group, LLC, the creator of the Practical Physical Exploitation Course and the Physical Exploitation Store. Since stepping out of Army Special Operations, Travis has worked within the offensive security space, performing advanced adversarial emulation assessments and leading offensive security practitioners. Travis is also an electronic engineer, embedded firmware developer, and the creator of various physical security tools, including the Doppelgänger suite of tools. Travis has spoken at various conferences, including DEF CON, Hack Miami, B-Sides Tampa, Hack Space Con, and Optiv's SourceZero Con. Travis has been published in Intelligent CIO and PROMPT# Zine ("Better Together" comic). Finally, Travis takes great pride in giving back to the Veteran community through mentorship and job placement assistance.
Kevin Ayala
Kevin is a Senior Security Consultant on Optiv's Attack & Penetration team, a PPE instructor, and a veteran of the 101st Airborne Division, where he served as a Cavalry Scout. He has performed and led a wide range of offensive operations, including physical, wireless, network, social engineering, and red team engagements. Kevin has presented at SourceZeroCon and volunteers with the Red Team Village. He is also a dedicated mentor, helping transitioning service members pursue careers in offensive security.
What We Offer
- Live Training Sessions: Dive deep into the world of physical exploitation with our seasoned instructors. Learn by doing, not just by listening.
- Real-World Scenarios: Our training modules are based on real-world scenarios encountered during hundreds of physical assessments, ensuring participants are prepared for what they might encounter in the field.
- For Everyone: Whether you're a seasoned red teamer looking to sharpen your skills, or someone new to the field of information security, our courses cater to all levels of expertise.
Why Choose Us
- Expertise: Our trainers are not just educators but professionals with years of field experience.
- Interactive Learning: We believe that one learns best by doing. Our training sessions are designed to be interactive and engaging.
- State-of-the-Art Facilities: Our training grounds are equipped with the latest tools and technologies to provide a realistic training environment.
- Community: Join a network of like-minded professionals and enthusiasts who are passionate about information security.
Join Us
Are you ready to elevate your skills and challenge your limits? Join us at Practical Physical Exploitation and be a part of the next generation of information security experts.