PUA/PUP PASSWORD INTEGRITY PURPLE TEAM EXPLOIT PCI BLUE TEAM CLOUD- BASED SIEM ON- PREM BOTNET ROOTKIT BYOD NOC GRAYHAT HONEYPOT KEYLOGGER SPEARPHISH MACHINE LEARNING PHISH EPP DOMAIN SOCIAL ENGINEERING AI BLACKHAT HEADERS ZOMBIE UBA IOT BRUTE FORCE ATTACK AVAILABILITY WORM SOC METADATA PATCH SOAR ZERO- DAY CONFIDENTIALITY ATTACK SURFACE ANOMALY BREACH DMZ SPOOFING RANSOMWARE KILL CHAIN VULNERABILITY EDR APT DDoS PENTEST THREAT INTELLIGENCE RED TEAM ENCRYPTION FIREWALL WHITEHAT THREAT HUNTING VPN C2C IOT 2FA PUA/PUP PASSWORD INTEGRITY PURPLE TEAM EXPLOIT PCI BLUE TEAM CLOUD- BASED SIEM ON- PREM BOTNET ROOTKIT BYOD NOC GRAYHAT HONEYPOT KEYLOGGER SPEARPHISH MACHINE LEARNING PHISH EPP DOMAIN SOCIAL ENGINEERING AI BLACKHAT HEADERS ZOMBIE UBA IOT BRUTE FORCE ATTACK AVAILABILITY WORM SOC METADATA PATCH SOAR ZERO- DAY CONFIDENTIALITY ATTACK SURFACE ANOMALY BREACH DMZ SPOOFING RANSOMWARE KILL CHAIN VULNERABILITY EDR APT DDoS PENTEST THREAT INTELLIGENCE RED TEAM ENCRYPTION FIREWALL WHITEHAT THREAT HUNTING VPN C2C IOT 2FA
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
PUA/PUP
PASSWORD
INTEGRITY
PURPLE TEAM
EXPLOIT
PCI
BLUE TEAM
CLOUD-BASED
SIEM
ON-PREM
BOTNET
ROOTKIT
BYOD
NOC
GRAYHAT
HONEYPOT
KEYLOGGER
SPEARPHISH
MACHINE LEARNING
PHISH
EPP
DOMAIN
SOCIAL ENGINEERING
AI
BLACKHAT
HEADERS
ZOMBIE
UBA
IOT
BRUTE FORCE ATTACK
AVAILABILITY
WORM
SOC
METADATA
PATCH
SOAR
ZERO-DAY
CONFIDENTIALITY
ATTACK SURFACE
ANOMALY
BREACH
DMZ
SPOOFING
RANSOMWARE
KILL CHAIN
VULNERABILITY
EDR
APT
DDoS
PENTEST
THREAT INTELLIGENCE
RED TEAM
ENCRYPTION
FIREWALL
WHITEHAT
THREAT HUNTING
VPN
C2C
IOT
2FA