Skip to content
Common CT Strats (6)
Counter-Strike: Source

Common CT Strats (6)

Learn the 2-1-2 CT strategy for Counter-Strike: Source, detailing defense on A and B sites, and the flexible role of the fifth player.

By ···10 min read·Multi-source verified
1 reading this guide  

Learn the 2-1-2 CT strategy for Counter-Strike: Source, detailing defense on A and B sites, and the flexible role of the fifth player.

Walkthrough
  1. 1
    Two Counter-Terrorists (CTs) defend A site. One CT watches Long, and the other watches Mid.
  2. 2
    Two CTs defend B site. One CT watches Monster, and the other watches Construction.
  3. 3
    The fifth CT has a flexible role. They can act as a passive third defender on either A or B site, a dynamic utility player who rotates to sites if a teammate is eliminated or boosts players over cover (press the cover button to crouch behind walls or objects) (an object providing protection from enemy fire), or an aggressive player pushing towards Fountain, Water, or Connector to gather intelligence on Terrorist positions.
Tips
  • The fifth player's role is crucial for adapting to the Terrorists' push.
  • Consider the map's layout when assigning the fifth player's duties, as there isn't a distinct "Mid" area on this map.
  • Effective communication is key for the fifth player to rotate effectively.

100% Human-Written. AI Fact-Checked. Community Verified. Learn how AntMag verifies content