UTSA CyManII End of School Cyber Clash Spring 2024

tournament start
May 11, 2024
@ 10:00AM CST
tournament ends
May 11, 2024
@ 05:00PM CST

presented by


Tournament Rules

The UTSA Cyber Range Powered by CyManII Presents:

End-of-School, IN-PERSON ONLY event that will allow you to jump into the next generation of hacking games with our very own E-Sports Tournament hosted by UTSA’s Cymanii program. All gamers should BYOD (bring your own device) and bring your hacking skills!

The tournament rules are very simple…it’s a race to the finish. Show us how quickly you can complete the most content in the least amount of time within the tournament start and finish times.

  • DO NOT play BEFORE the tournament starts. If you do, we will have to reset your game data!
  • The winner will be determined by the most number of content completed (including the tutorial).
  • Tie breakers will be determined by the amount of time taken to complete the content (fastest time wins).
  • Content difficulty does not matter, so grab those easy points from completing the tutorial missions at the beginning of the game.
  • The only indication of the tournament start is when the clock ticks to the Tournament Start time(s) below.

Tip: Since time to completion matters, login to CyberWraith only when you are actively playing. Sessions left logged in while you grab a cup of coffee will hurt you in the end.


Details of Schedule:
8am : Doors open

9am: Check in

10am: Tournament Starts!

Noon: Pizza while you’re hacking…

5pm: Tournament Ends!

5:15p: Award Ceremony of Top 3


Saturday May 11th, 2024

Graham Weston Conference Room (1st Floor San Pedro 1 building, Downtown UTSA campus)

506 Dolorosa St.
San Antonio, TX 78204, United States


The game is fun, and engaging with a Call of Duty look and feel to it.   Anyone can play including those that have no background in Cyber.  Start with some Academy training and then work your way through real-world scenarios.  You will learn the Stinger Operating System while playing which is a Cyber Warfare and Network Intrusion Platform.  Built by combining the most advanced open-source hacking modules from civilian and military sources.  If you have experienced any penetration testing platforms like Kali or Metasploit you will recognize similarities.

Register today!

Be More Than a Gamer. Be a Cyber Warrior.


No data was found


host or sponsor a tournament