KILL CHAIN AVAILABILITY BYOD ENCRYPTION BLACKHAT C2C BREACH THREAT INTELLIGENCE ZERO- DAY VPN ANOMALY BOTNET SPOOFING METADATA ZOMBIE DOMAIN RANSOMWARE PHISH IOT PCI PATCH AI SOC PASSWORD SOCIAL ENGINEERING NOC PENTEST INTEGRITY EXPLOIT WORM ATTACK SURFACE ON- PREM SIEM CONFIDENTIALITY BLUE TEAM DDoS SOAR SPEARPHISH CLOUD- BASED THREAT HUNTING WHITEHAT UBA PURPLE TEAM EDR BRUTE FORCE ATTACK ROOTKIT HEADERS PUA/PUP RED TEAM KEYLOGGER DMZ HONEYPOT IOT GRAYHAT 2FA EPP APT FIREWALL VULNERABILITY MACHINE LEARNING KILL CHAIN AVAILABILITY BYOD ENCRYPTION BLACKHAT C2C BREACH THREAT INTELLIGENCE ZERO- DAY VPN ANOMALY BOTNET SPOOFING METADATA ZOMBIE DOMAIN RANSOMWARE PHISH IOT PCI PATCH AI SOC PASSWORD SOCIAL ENGINEERING NOC PENTEST INTEGRITY EXPLOIT WORM ATTACK SURFACE ON- PREM SIEM CONFIDENTIALITY BLUE TEAM DDoS SOAR SPEARPHISH CLOUD- BASED THREAT HUNTING WHITEHAT UBA PURPLE TEAM EDR BRUTE FORCE ATTACK ROOTKIT HEADERS PUA/PUP RED TEAM KEYLOGGER DMZ HONEYPOT IOT GRAYHAT 2FA EPP APT FIREWALL VULNERABILITY MACHINE LEARNING
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
KILL CHAIN
AVAILABILITY
BYOD
ENCRYPTION
BLACKHAT
C2C
BREACH
THREAT INTELLIGENCE
ZERO-DAY
VPN
ANOMALY
BOTNET
SPOOFING
METADATA
ZOMBIE
DOMAIN
RANSOMWARE
PHISH
IOT
PCI
PATCH
AI
SOC
PASSWORD
SOCIAL ENGINEERING
NOC
PENTEST
INTEGRITY
EXPLOIT
WORM
ATTACK SURFACE
ON-PREM
SIEM
CONFIDENTIALITY
BLUE TEAM
DDoS
SOAR
SPEARPHISH
CLOUD-BASED
THREAT HUNTING
WHITEHAT
UBA
PURPLE TEAM
EDR
BRUTE FORCE ATTACK
ROOTKIT
HEADERS
PUA/PUP
RED TEAM
KEYLOGGER
DMZ
HONEYPOT
IOT
GRAYHAT
2FA
EPP
APT
FIREWALL
VULNERABILITY
MACHINE LEARNING