DDoSPCITHREATHUNTINGPENTESTATTACKSURFACESIEMSOCIALENGINEERINGWORMMETADATAHEADERSEXPLOITROOTKITBYODBOTNETBRUTEFORCEATTACKON-PREMHONEYPOTZOMBIEVULNERABILITYAIKEYLOGGERNOCAVAILABILITYDOMAINMACHINELEARNINGENCRYPTIONEDRANOMALYZERO-DAYPATCHIOTTHREATINTELLIGENCE2FACONFIDENTIALITYSOCIOTFIREWALLWHITEHATBREACHREDTEAMPHISHGRAYHATEPPRANSOMWAREDMZBLACKHATUBAPASSWORDPUA/PUPSPOOFINGSOARVPNSPEARPHISHC2CBLUETEAMPURPLETEAMCLOUD-BASEDAPTINTEGRITYKILLCHAINDDoSPCITHREATHUNTINGPENTESTATTACKSURFACESIEMSOCIALENGINEERINGWORMMETADATAHEADERSEXPLOITROOTKITBYODBOTNETBRUTEFORCEATTACKON-PREMHONEYPOTZOMBIEVULNERABILITYAIKEYLOGGERNOCAVAILABILITYDOMAINMACHINELEARNINGENCRYPTIONEDRANOMALYZERO-DAYPATCHIOTTHREATINTELLIGENCE2FACONFIDENTIALITYSOCIOTFIREWALLWHITEHATBREACHREDTEAMPHISHGRAYHATEPPRANSOMWAREDMZBLACKHATUBAPASSWORDPUA/PUPSPOOFINGSOARVPNSPEARPHISHC2CBLUETEAMPURPLETEAMCLOUD-BASEDAPTINTEGRITYKILLCHAIN

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. DDoS
  2. PCI
  3. THREAT HUNTING
  4. PENTEST
  5. ATTACK SURFACE
  6. SIEM
  7. SOCIAL ENGINEERING
  8. WORM
  9. METADATA
  10. HEADERS
  11. EXPLOIT
  12. ROOTKIT
  13. BYOD
  14. BOTNET
  15. BRUTE FORCE ATTACK
  16. ON-PREM
  17. HONEYPOT
  18. ZOMBIE
  19. VULNERABILITY
  20. AI
  21. KEYLOGGER
  22. NOC
  23. AVAILABILITY
  24. DOMAIN
  25. MACHINE LEARNING
  26. ENCRYPTION
  27. EDR
  28. ANOMALY
  29. ZERO-DAY
  30. PATCH
  31. IOT
  32. THREAT INTELLIGENCE
  33. 2FA
  34. CONFIDENTIALITY
  35. SOC
  36. IOT
  37. FIREWALL
  38. WHITEHAT
  39. BREACH
  40. RED TEAM
  41. PHISH
  42. GRAYHAT
  43. EPP
  44. RANSOMWARE
  45. DMZ
  46. BLACKHAT
  47. UBA
  48. PASSWORD
  49. PUA/PUP
  50. SPOOFING
  51. SOAR
  52. VPN
  53. SPEARPHISH
  54. C2C
  55. BLUE TEAM
  56. PURPLE TEAM
  57. CLOUD-BASED
  58. APT
  59. INTEGRITY
  60. KILL CHAIN