This bingo card has a free space and 44 words: Cyber, Kill Chain, C2, MITRE ATT&CK, Malware, APT, Next Gen/NGFW, Ransomware, Threat Intel, Defense, Exploit, Risk, Alert, Detections, SOC, SIEM, Splunk, Vulnerability, Sandbox, Endpoints, NIST, Phishing, Tactics, Techniques, and Procedures, DLP, White Hat Hacker, Black Hat Hacker, IoT (Internet of Things), Encryption, Social Engineering, Rules of Engagement, Privilege Escalation, ACL, Principle of least privilege, Resiliency, Controls, Cloud, DevSecOps, CASB, Zero Trust, DDoS, Firewall, Tools, Real-Time and Insider Threat.
Social Engineering and Hacker Bingo | Tradecraft Tuesday BINGO! | Cyber Security Bingo | The strongest bingo | Bu!! 8h1t BINGO
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.