APT EPP BLACKHAT SPOOFING EDR RED TEAM PHISH ZERO- DAY CLOUD- BASED 2FA ON- PREM NOC DOMAIN PCI METADATA HONEYPOT IOT VPN DMZ IOT C2C SOC AI THREAT INTELLIGENCE PENTEST FIREWALL KEYLOGGER ENCRYPTION KILL CHAIN PASSWORD ANOMALY ZOMBIE BOTNET DDoS SOCIAL ENGINEERING AVAILABILITY PATCH BLUE TEAM GRAYHAT SIEM HEADERS RANSOMWARE INTEGRITY PUA/PUP MACHINE LEARNING VULNERABILITY BYOD WORM SPEARPHISH UBA ROOTKIT WHITEHAT EXPLOIT THREAT HUNTING PURPLE TEAM BRUTE FORCE ATTACK SOAR BREACH ATTACK SURFACE CONFIDENTIALITY APT EPP BLACKHAT SPOOFING EDR RED TEAM PHISH ZERO- DAY CLOUD- BASED 2FA ON- PREM NOC DOMAIN PCI METADATA HONEYPOT IOT VPN DMZ IOT C2C SOC AI THREAT INTELLIGENCE PENTEST FIREWALL KEYLOGGER ENCRYPTION KILL CHAIN PASSWORD ANOMALY ZOMBIE BOTNET DDoS SOCIAL ENGINEERING AVAILABILITY PATCH BLUE TEAM GRAYHAT SIEM HEADERS RANSOMWARE INTEGRITY PUA/PUP MACHINE LEARNING VULNERABILITY BYOD WORM SPEARPHISH UBA ROOTKIT WHITEHAT EXPLOIT THREAT HUNTING PURPLE TEAM BRUTE FORCE ATTACK SOAR BREACH ATTACK SURFACE CONFIDENTIALITY
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
APT
EPP
BLACKHAT
SPOOFING
EDR
RED TEAM
PHISH
ZERO-DAY
CLOUD-BASED
2FA
ON-PREM
NOC
DOMAIN
PCI
METADATA
HONEYPOT
IOT
VPN
DMZ
IOT
C2C
SOC
AI
THREAT INTELLIGENCE
PENTEST
FIREWALL
KEYLOGGER
ENCRYPTION
KILL CHAIN
PASSWORD
ANOMALY
ZOMBIE
BOTNET
DDoS
SOCIAL ENGINEERING
AVAILABILITY
PATCH
BLUE TEAM
GRAYHAT
SIEM
HEADERS
RANSOMWARE
INTEGRITY
PUA/PUP
MACHINE LEARNING
VULNERABILITY
BYOD
WORM
SPEARPHISH
UBA
ROOTKIT
WHITEHAT
EXPLOIT
THREAT HUNTING
PURPLE TEAM
BRUTE FORCE ATTACK
SOAR
BREACH
ATTACK SURFACE
CONFIDENTIALITY