About Us

Red Team Alliance (RTA) provides immersive real-world security training that equips professionals and organizations with the skills and mindset needed to understand, identify, and emulate physical threats.

‎ ‎ ‎ ‎ ‎ World-Renown Instruction

RTA offers a critical, and often overlooked, cybersecurity readiness: the human, physical, and environmental vulnerabilities exploited in the real world.
Enroll Now

‎ ‎ ‎ ‎ ‎ Hands-On Learning

RTA delivers instruction on covert entry, surveillance, lock bypass techniques, breach methodologies, and other critical areas of physical security taught by seasoned professionals.
Enroll Now

RTA is led by Babak Javadi and Deviant Ollam, part of the original founding team and seasoned practitioners with backgrounds in non-destructive entry, novel tool development, and security infrastructure testing.

The company has quietly earned a place as a trusted resource in the rising field of physical security education.

Their work reflects a thoughtful, threat-based approach—focusing not on flashy simulations, but on teaching the realities of adversarial thinking in a way that’s both rigorous and responsible.

RTA's development of its proprietary material in dedicated classrooms and training facilities that allows them to mock up full-scale environments to prove out concepts and test skills. From private-sector security teams to individual practitioners, their students learn how to assess real environments, understand attacker behavior, and make smarter, faster decisions under pressure.

Training can be tailored for different organizational roles and risk levels, offering both pre-built curricula and custom tracks that reflect the unique challenges of each organization.

Red Team Tools

Proud Partners

Red Team Tools (RTT), develops and sells trusted, field-tested tools for security professionals. Every product undergoes rigorous quality assurance to ensure shop-to-field reliability for professionals and aspiring amateurs.

Responsibility Statement:

Red Team Alliance and Red Team Tools strictly limit covert entry tools and techniques to authorized professional engagements conducted within all applicable legal frameworks. Any illegal, unauthorized, or unethical use of these capabilities are unequivocally condemned and prohibited. Violations will result in immediate termination of business relationships and referral to appropriate authorities.