top of page
Cyber_Adversary_Hero_Header_Banner.png

Who We Battle
Cyber Adversary Cards

Know Your Enemy. Master the Threat. Defend the Future.

Welcome to the Cyber Cadet Adversary Deck

​​

At Cyber Engineering Academy, we teach theory and train the next generation of cyber defenders to recognize and respond to real-world threats. The Cyber Cadet Adversary Cards provide a gamified learning experience that enables students to understand modern cyber threat actors, their tactics, and how to counter them.

​

Each card in the deck represents a known cyber threat category—from hacktivists and ransomware gangs to insider threats and nation-state actors. These cards are used during weekly and monthly challenges in your Junior or Senior Cadet year. They're visually powerful, fun to collect, and a smart way to sharpen your defensive engineering skills.

Types of Cyber Adversaries

In the world of cybersecurity, understanding your adversary is critical. This page outlines the various types of black hat hackers, each with unique motivations, skill levels, and methods of attack. Awareness of these adversaries helps organizations and individuals better prepare and defend against potential threats.

Screenshot 2025-05-08 211537 - Edited.png

Cyberterrorist

Screenshot 2025-05-08 211504 - Edited.png

Script Kiddie

Screenshot 2025-05-08 211842 - Edited.png

State-Sponsored

Screenshot 2025-05-08 211521 - Edited.png

Cybercriminal

Screenshot 2025-05-08 211602 - Edited.png

Hacktivist

Screenshot 2025-05-08 211612 - Edited.png

Insider Threat

What Do These Cards Represent?

Here’s a breakdown of what each section of a Cyber Cadet Adversary Card means:

​

  • Name – The codename of the adversary group or fictional clone (e.g., "GrayCore Operative" or "Crimson Sickle")

  • Region – Where the group is based or operates most frequently

  • Type – What kind of threat actor they are (Hacktivist, Nation-State, Cybercriminal, etc.)

  • Known Tactics – The attack methods they’re known for (e.g., phishing, ransomware, insider leaks)

  • Defensive Weak Spot – The best way to defend against their methods

  • Skill Rating – A 1–5 rating that tells you how advanced and dangerous this threat is

  • Scenario Prompt – A realistic description of how this actor might strike

  • Challenge Question – Your mission: answer how you would defend against them

Why This Matters for STEM + Cyber Students?

These cards combine everything we believe: structured learning, real-world defense, and engineering-based decision-making. You’ll see how attackers think, how systems are compromised, and how you, the future engineer, can build a more intelligent, secure infrastructure.

​

Whether you're a Junior Cadet just learning the ropes or a Senior Cadet leading a simulated defense team, these cards give you a window into what’s out there. They’re more than just games. They’re training tools for tomorrow’s cybersecurity defenders.

Image by Tarik Haiga

Get Ready to Collect and Conquer!

​Earn cards by completing lab challenges, solving adversary scenarios, and participating in live events. Build your deck. Build your knowledge. And above all, build the systems that protect people.

​

​Cyber Cadet Adversary Cards. One card at a time, we defend the future.

bottom of page