Collegiate cyber defense competition where teams of 8 defend real-world networks
World's largest cyber defense competition cofounded with the Air Force to inspire students towards STEM careers
Individual or team network assessment and network defense competition where competitors vie for control of resources
Collegiate cyber defense competition where teams compete by securing provided virtual machines
Low- and no-cost professional training solutions through certification prep courses and cybersecurity awareness training.
Research-based cybersecurity courses aimed at helping individuals in states and communities nationwide to develop and improve their own cybersecurity programs
We customize training, host workshops, and conduct community-wide exercises to suit your organization’s individual needs
Cyber Threat Protector is designed as a two-player game, but it can be modified to allow for more players. Below is a brief overview to help you get started.
For more detailed instructions on how to play Cyber Threat Protector (CTP), simply download the free rulebook. It explains the games objectives, how to set-up a game, keep score and illustrates a full round of play.
You can also use the complementary instructional slides when introducing it to your classroom or watch a sample game of CTP below.
The goal of Cyber Threat Protector is to build your network faster than your opponent can and gain more points than your opponent. While you are doing this, you have to remember to defend your network because your opponent is going to try and disrupt your systems while building their network. The first player to gain 20 points wins!
Players must choose the right defenses to protect their network from the various attacks their opponent will challenge them with. The player with the most complete set of security defenses will be the one who is able to protect their critical systems and emerge victorious.
As a reminder, a single deck of Cyber Threat Protector is shared by two players. To get started, shuffle the cards. Once the deck is shuffled, both players will decide who will be player one. Decide which player will keep score and have that player write their names on a score sheet.
Once each player agrees upon who will go first and the score sheets are prepared, place the card deck between the players face down. Both players need to draw five (5) cards. Players may look at their hand.
Only on the first turn, player one can play up to four cards from their hand during this turn. This is the only time that either player can play up to four cards. During all remaining turns, player one can play only three cards. During the first turn, player two can play no more than three cards.
Make sure to read each card closely to identify how card types interact with each other. Some cards require other cards to be in play before being played. Some cards can only be used when specific cards are not in play. Some cards will not be allowed to have multiple in play.
After player one has taken their turn – and before player two’s turn – player one discards all remaining cards in their hand and draws five (5) new cards. Next, player two may then play up to three cards. After the cards have been played, player two must discard all cards not played and draw five (5) new cards. (Note: Players may not always be able to play three cards during their turn. This is why players may play up to three cards per turn.)
All discarded cards need to be placed face up into a new pile between both players. Both players share the discard pile. When player two finishes their turn, the round ends. Both players need to determine their score at the end of the round.
For an example of a round of play, download the CTP Rulebook or watch the video to see a full game being played.
Keep track of the points gained and lost during each round. Only Asset cards provide opportunities for a player to gain points; the Attack cards you played during a round may enable you to remove points from an opponent’s field.
With this in mind, at the end of each round, both players need to tally their points gained from Assets in their play field and subtract points played against them from their opponent’s Attack cards.
Each blue Asset card is worth 1 point. Each red Attack card removes 1 point from your opponent. The first player to 20 points wins!
In developing this game, we recognize that we have taken some liberties with how things actually work. We have attempted to keep true to the spirit of computer security, but for playability reasons have slightly modified how things might actually work in reality. We believe, however, that the game is close enough that individuals playing the game will be able to gain some understanding of basic computer security concepts.
The CIAS was established at UTSA in June of 2001 as part of UTSA’s creation of a cybersecurity program. The CIAS delivers quality research, training, K-12 education, and competition and exercise programs to advance organizational and community cybersecurity capabilities and collaboration.