APT PASSWORD SOC BLACKHAT GRAYHAT DOMAIN CLOUD- BASED ANOMALY AI RANSOMWARE IOT WHITEHAT UBA KILL CHAIN C2C MACHINE LEARNING METADATA NOC 2FA SPOOFING BOTNET ZERO- DAY EPP PENTEST ENCRYPTION FIREWALL ON- PREM KEYLOGGER ATTACK SURFACE PATCH SIEM THREAT HUNTING WORM BREACH RED TEAM SOCIAL ENGINEERING EXPLOIT PCI CONFIDENTIALITY AVAILABILITY PHISH DMZ ROOTKIT ZOMBIE VULNERABILITY BRUTE FORCE ATTACK THREAT INTELLIGENCE BYOD PURPLE TEAM VPN SOAR HEADERS BLUE TEAM INTEGRITY EDR IOT SPEARPHISH DDoS HONEYPOT PUA/PUP APT PASSWORD SOC BLACKHAT GRAYHAT DOMAIN CLOUD- BASED ANOMALY AI RANSOMWARE IOT WHITEHAT UBA KILL CHAIN C2C MACHINE LEARNING METADATA NOC 2FA SPOOFING BOTNET ZERO- DAY EPP PENTEST ENCRYPTION FIREWALL ON- PREM KEYLOGGER ATTACK SURFACE PATCH SIEM THREAT HUNTING WORM BREACH RED TEAM SOCIAL ENGINEERING EXPLOIT PCI CONFIDENTIALITY AVAILABILITY PHISH DMZ ROOTKIT ZOMBIE VULNERABILITY BRUTE FORCE ATTACK THREAT INTELLIGENCE BYOD PURPLE TEAM VPN SOAR HEADERS BLUE TEAM INTEGRITY EDR IOT SPEARPHISH DDoS HONEYPOT PUA/PUP
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
APT
PASSWORD
SOC
BLACKHAT
GRAYHAT
DOMAIN
CLOUD-BASED
ANOMALY
AI
RANSOMWARE
IOT
WHITEHAT
UBA
KILL CHAIN
C2C
MACHINE LEARNING
METADATA
NOC
2FA
SPOOFING
BOTNET
ZERO-DAY
EPP
PENTEST
ENCRYPTION
FIREWALL
ON-PREM
KEYLOGGER
ATTACK SURFACE
PATCH
SIEM
THREAT HUNTING
WORM
BREACH
RED TEAM
SOCIAL ENGINEERING
EXPLOIT
PCI
CONFIDENTIALITY
AVAILABILITY
PHISH
DMZ
ROOTKIT
ZOMBIE
VULNERABILITY
BRUTE FORCE ATTACK
THREAT INTELLIGENCE
BYOD
PURPLE TEAM
VPN
SOAR
HEADERS
BLUE TEAM
INTEGRITY
EDR
IOT
SPEARPHISH
DDoS
HONEYPOT
PUA/PUP