Preliminaries: Static and Dynamic Games, Normal form and Extensive Form Games, Zero-sum and Non-zero-sum games, Bayesian Games, Stackelberg Games, Perfect vs Imperfect Information, Complete vs Incomplete Information, Stochastic Games.Intrusion Detection Games: Cyber Warfare Games, Games for Denial of Service and Distributed Denial of Service (DDoS), Flooding, Malware, Ransomware. Games for Protecting Critical Infrastructure.Wireless Security Games: Physical and MAC layer security games, Secure Routing Games, Games for Secure Ad hoc, Sensor and Vehicular Networks.Economics of Cybersecurity: Games for Resource Allocation and Incentive compatibility, Games for Risk Assessment and Mitigation, Economic models and metrics for Cybersecurity.Blockchain Games: Game theoretic models for Consensus algorithms, Games for Double Spending Attacks and Selfish Mining, Cheating Games,Games for DDoS attacks.Privacy Games: Games for Identity and Location Privacy, Local vs Global Eavesdroppers, Trust Games, Trust vs Privacy