This bingo card has a free space and 24 words: Uses a password manager, Is a freshman, Attended a DEFCON or Black Hat conference, Is a non-STEM major, Has a certification (e.g., CompTIA Security+, CISSP), Uses multi-factor authentication on most accounts, Has experienced a phishing attack, Knows how to program in Python, Has set up a home lab for cybersecurity, Has received a ransomware attack, Has built their own firewall, Has a pet at home, Plays an instrument, Has participated in a Capture the Flag (CTF) competition, Has taken a course in cryptography, Reads cybersecurity news daily, Has reverse-engineered malware, Uses Linux as their main operating system, Has a part-time job, Is double-majoring, Has contributed to open-source security projects, Has attended a cybersecurity job fair, Completed a cybersecurity internship and Can speak multiple languages.
Tech Human Bingo | K & C Bingo | Cyber Bingo | Networking Bingo! | Women in Cyber Human Bingo!
Share this URL with your players:
For more control of your online game, create a clone of this card first.
Learn how to conduct a bingo game.
With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.
Tip: If you want your game to last longer (on average), add more unique words/images to it.