APTEPPBLACKHATSPOOFINGEDRREDTEAMPHISHZERO-DAYCLOUD-BASED2FAON-PREMNOCDOMAINPCIMETADATAHONEYPOTIOTVPNDMZIOTC2CSOCAITHREATINTELLIGENCEPENTESTFIREWALLKEYLOGGERENCRYPTIONKILLCHAINPASSWORDANOMALYZOMBIEBOTNETDDoSSOCIALENGINEERINGAVAILABILITYPATCHBLUETEAMGRAYHATSIEMHEADERSRANSOMWAREINTEGRITYPUA/PUPMACHINELEARNINGVULNERABILITYBYODWORMSPEARPHISHUBAROOTKITWHITEHATEXPLOITTHREATHUNTINGPURPLETEAMBRUTEFORCEATTACKSOARBREACHATTACKSURFACECONFIDENTIALITYAPTEPPBLACKHATSPOOFINGEDRREDTEAMPHISHZERO-DAYCLOUD-BASED2FAON-PREMNOCDOMAINPCIMETADATAHONEYPOTIOTVPNDMZIOTC2CSOCAITHREATINTELLIGENCEPENTESTFIREWALLKEYLOGGERENCRYPTIONKILLCHAINPASSWORDANOMALYZOMBIEBOTNETDDoSSOCIALENGINEERINGAVAILABILITYPATCHBLUETEAMGRAYHATSIEMHEADERSRANSOMWAREINTEGRITYPUA/PUPMACHINELEARNINGVULNERABILITYBYODWORMSPEARPHISHUBAROOTKITWHITEHATEXPLOITTHREATHUNTINGPURPLETEAMBRUTEFORCEATTACKSOARBREACHATTACKSURFACECONFIDENTIALITY

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. APT
  2. EPP
  3. BLACKHAT
  4. SPOOFING
  5. EDR
  6. RED TEAM
  7. PHISH
  8. ZERO-DAY
  9. CLOUD-BASED
  10. 2FA
  11. ON-PREM
  12. NOC
  13. DOMAIN
  14. PCI
  15. METADATA
  16. HONEYPOT
  17. IOT
  18. VPN
  19. DMZ
  20. IOT
  21. C2C
  22. SOC
  23. AI
  24. THREAT INTELLIGENCE
  25. PENTEST
  26. FIREWALL
  27. KEYLOGGER
  28. ENCRYPTION
  29. KILL CHAIN
  30. PASSWORD
  31. ANOMALY
  32. ZOMBIE
  33. BOTNET
  34. DDoS
  35. SOCIAL ENGINEERING
  36. AVAILABILITY
  37. PATCH
  38. BLUE TEAM
  39. GRAYHAT
  40. SIEM
  41. HEADERS
  42. RANSOMWARE
  43. INTEGRITY
  44. PUA/PUP
  45. MACHINE LEARNING
  46. VULNERABILITY
  47. BYOD
  48. WORM
  49. SPEARPHISH
  50. UBA
  51. ROOTKIT
  52. WHITEHAT
  53. EXPLOIT
  54. THREAT HUNTING
  55. PURPLE TEAM
  56. BRUTE FORCE ATTACK
  57. SOAR
  58. BREACH
  59. ATTACK SURFACE
  60. CONFIDENTIALITY