This bingo card has a free space and 30 words: Firewall, Encryption, Malware, Phishing, Antivirus, VPN (Virtual Private Network), Penetration Testing, Two-factor Authentication (2FA), Zero-day Exploit, Social Engineering, Patch, Incident Response, DDoS (Distributed Denial of Service), Biometric Authentication, Cryptography, SIEM (Security Information and Event Management), White Hat Hacker, Black Hat Hacker, Intrusion Detection System (IDS), Access Control, Cybersecurity Framework, Ransomware, Endpoint Security, Tokenization, Packet Sniffing, Rootkit, Cyber Threat Intelligence, Honeypot, NIST (National Institute of Standards and Technology) and Man-in-the-Middle (MitM) Attack.
Cybersecuirty | CyberSecurity Awareness | Cybersecurity Superhero BINGO! | Security Bingo | Cybersecurity Bingo
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.