PCI2FARANSOMWAREMETADATAIOTEDREXPLOITWHITEHATSOCC2CHONEYPOTCONFIDENTIALITYCLOUD-BASEDMACHINELEARNINGBOTNETAVAILABILITYZERO-DAYZOMBIESIEMBLUETEAMFIREWALLPENTESTPURPLETEAMON-PREMSOARVPNPUA/PUPTHREATHUNTINGPHISHKEYLOGGERINTEGRITYATTACKSURFACEUBAHEADERSSPOOFINGGRAYHATAIVULNERABILITYSOCIALENGINEERINGDOMAINBREACHDMZIOTKILLCHAINTHREATINTELLIGENCEBYODROOTKITAPTBRUTEFORCEATTACKEPPREDTEAMDDoSENCRYPTIONPATCHBLACKHATANOMALYNOCWORMSPEARPHISHPASSWORDPCI2FARANSOMWAREMETADATAIOTEDREXPLOITWHITEHATSOCC2CHONEYPOTCONFIDENTIALITYCLOUD-BASEDMACHINELEARNINGBOTNETAVAILABILITYZERO-DAYZOMBIESIEMBLUETEAMFIREWALLPENTESTPURPLETEAMON-PREMSOARVPNPUA/PUPTHREATHUNTINGPHISHKEYLOGGERINTEGRITYATTACKSURFACEUBAHEADERSSPOOFINGGRAYHATAIVULNERABILITYSOCIALENGINEERINGDOMAINBREACHDMZIOTKILLCHAINTHREATINTELLIGENCEBYODROOTKITAPTBRUTEFORCEATTACKEPPREDTEAMDDoSENCRYPTIONPATCHBLACKHATANOMALYNOCWORMSPEARPHISHPASSWORD

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. PCI
  2. 2FA
  3. RANSOMWARE
  4. METADATA
  5. IOT
  6. EDR
  7. EXPLOIT
  8. WHITEHAT
  9. SOC
  10. C2C
  11. HONEYPOT
  12. CONFIDENTIALITY
  13. CLOUD-BASED
  14. MACHINE LEARNING
  15. BOTNET
  16. AVAILABILITY
  17. ZERO-DAY
  18. ZOMBIE
  19. SIEM
  20. BLUE TEAM
  21. FIREWALL
  22. PENTEST
  23. PURPLE TEAM
  24. ON-PREM
  25. SOAR
  26. VPN
  27. PUA/PUP
  28. THREAT HUNTING
  29. PHISH
  30. KEYLOGGER
  31. INTEGRITY
  32. ATTACK SURFACE
  33. UBA
  34. HEADERS
  35. SPOOFING
  36. GRAYHAT
  37. AI
  38. VULNERABILITY
  39. SOCIAL ENGINEERING
  40. DOMAIN
  41. BREACH
  42. DMZ
  43. IOT
  44. KILL CHAIN
  45. THREAT INTELLIGENCE
  46. BYOD
  47. ROOTKIT
  48. APT
  49. BRUTE FORCE ATTACK
  50. EPP
  51. RED TEAM
  52. DDoS
  53. ENCRYPTION
  54. PATCH
  55. BLACKHAT
  56. ANOMALY
  57. NOC
  58. WORM
  59. SPEARPHISH
  60. PASSWORD