PCI 2FA RANSOMWARE METADATA IOT EDR EXPLOIT WHITEHAT SOC C2C HONEYPOT CONFIDENTIALITY CLOUD- BASED MACHINE LEARNING BOTNET AVAILABILITY ZERO- DAY ZOMBIE SIEM BLUE TEAM FIREWALL PENTEST PURPLE TEAM ON- PREM SOAR VPN PUA/PUP THREAT HUNTING PHISH KEYLOGGER INTEGRITY ATTACK SURFACE UBA HEADERS SPOOFING GRAYHAT AI VULNERABILITY SOCIAL ENGINEERING DOMAIN BREACH DMZ IOT KILL CHAIN THREAT INTELLIGENCE BYOD ROOTKIT APT BRUTE FORCE ATTACK EPP RED TEAM DDoS ENCRYPTION PATCH BLACKHAT ANOMALY NOC WORM SPEARPHISH PASSWORD PCI 2FA RANSOMWARE METADATA IOT EDR EXPLOIT WHITEHAT SOC C2C HONEYPOT CONFIDENTIALITY CLOUD- BASED MACHINE LEARNING BOTNET AVAILABILITY ZERO- DAY ZOMBIE SIEM BLUE TEAM FIREWALL PENTEST PURPLE TEAM ON- PREM SOAR VPN PUA/PUP THREAT HUNTING PHISH KEYLOGGER INTEGRITY ATTACK SURFACE UBA HEADERS SPOOFING GRAYHAT AI VULNERABILITY SOCIAL ENGINEERING DOMAIN BREACH DMZ IOT KILL CHAIN THREAT INTELLIGENCE BYOD ROOTKIT APT BRUTE FORCE ATTACK EPP RED TEAM DDoS ENCRYPTION PATCH BLACKHAT ANOMALY NOC WORM SPEARPHISH PASSWORD
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PCI
2FA
RANSOMWARE
METADATA
IOT
EDR
EXPLOIT
WHITEHAT
SOC
C2C
HONEYPOT
CONFIDENTIALITY
CLOUD-BASED
MACHINE LEARNING
BOTNET
AVAILABILITY
ZERO-DAY
ZOMBIE
SIEM
BLUE TEAM
FIREWALL
PENTEST
PURPLE TEAM
ON-PREM
SOAR
VPN
PUA/PUP
THREAT HUNTING
PHISH
KEYLOGGER
INTEGRITY
ATTACK SURFACE
UBA
HEADERS
SPOOFING
GRAYHAT
AI
VULNERABILITY
SOCIAL ENGINEERING
DOMAIN
BREACH
DMZ
IOT
KILL CHAIN
THREAT INTELLIGENCE
BYOD
ROOTKIT
APT
BRUTE FORCE ATTACK
EPP
RED TEAM
DDoS
ENCRYPTION
PATCH
BLACKHAT
ANOMALY
NOC
WORM
SPEARPHISH
PASSWORD