Search
Close this search box.

Cyber Threat Guardian (CTG) is a multi-player card game, for ages five and up, that introduces players to technology and cybersecurity terms and concepts.

Like other family games, it involves a little strategy and a bit of luck. This game is a fun way for younger children to begin learning about patterns, online safety practices, technology terminology and cyber-attacks! CTG is a fun, easy card game for the classroom where students learn as they play.

In CTG, the goal is to build a network quickly and protect it from your opponent. While building up a network of assets, each player must also work to defend their network from their opponent’s attempts to disrupt their system from cyber threats. Players quickly learn that for every attack there is a defense, and for every defense there is an attack to get around it. The player with the most complete set of security defenses will be the one to protect their critical systems and emerge victorious.

In CTG, the player with the most asset and defense cards at the end of the game is the winner! However, the rules and game setup vary for three different age groups: Grades K-1, Grades 1-2, and Second Grade and up. Visit the CTG Rules page to help you choose the game option that best fits your needs.

Cyber Threat Guardian Cards

Each Cyber Threat Guardian deck includes 16 Asset Cards, 18 Attack Cards and 16 Defense Cards. The game is designed for two players to share a single deck; the player with the most Asset cards at the end of the game wins!

There are two primary objectives to consider when playing: (1) protect each asset with a defense card and (2) become the winner by obtaining the most asset and defense cards at the end of the game.

Cyber Threat Guardian cards display three types of information: the name of the card, a picture representing the item, and an icon depicting the card’s category.

CTG Asset Cards

These cards represent the things you may have in your home like a desktop computer, cell phone, game console or private information about yourself. These are the cards you need to protect.

CTG Defense Cards

Defense cards represent the systems used to protect devices, such as firewalls, anti-malware, encryption and education. These are the cards used to protect the asset cards. Defense cards will prevent the attack cards from removing asset cards.

CTG Attack Cards

Attack cards are represented by the various ways that hackers, or bad guys, can harm computers, game consoles, mobile phones or steal private personal information. Attack cards will remove unprotected asset cards. Note: Defense cards protect against attack cards.
Order Cards

Teachers can order one complementary classroom box of Cyber Threat Guardian, and anyone can purchase their own personal card deck and/or game accessories, from our CIAS.store.

Complementary Worksheets

The CIAS, in partnership with cybersecurity teachers and UTSA professors, continue to develop turnkey materials for use at home or in the classroom. Below is an initial set of STEM activity sheets that can be used to introduce technology and cybersecurity concepts to complement Cyber Threat Guardian. For instructions on how to play the game, visit our CTG Rules Page.

Additional Resources & Curricula

not endorsed or affiliated with the CIAS

CyberSeek

CyberSeek is an interactive tool that provides detailed, actionable data about supply and demand in the cybersecurity job market.

SafetyKay

SafetyKay provides Safety Curriculum through their digital platform to teach children how to protect their information, avoid online strangers and prevent cyberbullying, among other topics. You’ll also find our CyBear family on their SafetyKay Freebies page!

CYBER.ORG

Funded by a grant, CYBER.ORG provides cybersecurity curricula at no cost to K-12 educators within the United States and territories. Their curricula includes an introduction to cybersecurity, cybersecurity basics, cyber literacy, IT fundamentals, computational thinking and coding fundamentals. Sign up today!