Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
Cyber Threat Protector (CTP) is a multi-player card game, targeting grades 3-5, that introduces players to technology and cybersecurity terms and concepts.
With an average game lasting 20 minutes, players will learn basic cybersecurity terminology, be introduced to a network infrastructure, learn about the relationships between cyber-attacks and defense counter measures, real-world challenges connected to this STEM field, and much more.
In CTP, the goal is to build a network quickly and reach 20 points before your opponent. While building up a network of assets, each player must also work to defend their network from their opponent’s attempts to disrupt system from cyber threats. Players quickly learn that for every attack there is a defense, and for every defense there is an attack to get around it. The player with the most complete set of security defenses will be the one to protect their critical systems and emerge victorious.
Because CTP is designed to be fun first, players will learn basic and complex cybersecurity concepts and strategies through repetitive play. CTP is made available, at no cost, to K-5 educators nationwide thanks to the generous support of sponsors.
With Cyber Threat Protector, players learn how to defend a computer network against malicious cyber threats! With these cards, you will protect your network’s assets from disruptive tactics, like IP Spoofing and Phishing scams, from infiltrating your systems.
CTP cards include four distinct card types: Asset, Defense, Event and Attack. The card types are quickly identified by their color, and each clearly explains whether a card adds or subtracts points, specific cards it can defend against or remove from play, how long a card may remain in the game and other essential rules needed for each individual card.
Cyber Threat Protector cards vary in the information that they display. For instance, a card may list the names of specific cards that it can remove from play, while others can block specific cards from being played or have unique effects that can be used for only one round. Each card clearly identifies how it can be used in the game and what cards, if any, it can interact with during a turn. Make sure to read each card’s abilities!
The Cyber Threat Protector cards are available to view below by type. Note: There may be more than one of each card in the deck.
Teachers can order one complementary classroom box of Cyber Threat Protector, and anyone can purchase their own personal card deck and/or game accessories, from our Marketplace here.
The CIAS, in partnership with cybersecurity teachers and UTSA professors, continue to develop turnkey materials for use at home or in the classroom. Below is an initial set of STEM activity sheets that can be used to introduce technology and cybersecurity concepts to complement Cyber Threat Protector. For instructions on how to play the game, visit our CTP Rules Page.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.