ROOTKIT C2C SOCIAL ENGINEERING WHITEHAT PASSWORD THREAT HUNTING SOC CONFIDENTIALITY SPOOFING ENCRYPTION 2FA PENTEST SIEM GRAYHAT IOT EPP BREACH ON- PREM ZERO- DAY CLOUD- BASED DOMAIN DMZ WORM ATTACK SURFACE UBA BOTNET NOC EXPLOIT PUA/PUP EDR SOAR KEYLOGGER IOT PATCH PHISH PURPLE TEAM ANOMALY METADATA BYOD VPN SPEARPHISH RANSOMWARE THREAT INTELLIGENCE VULNERABILITY MACHINE LEARNING INTEGRITY HONEYPOT FIREWALL DDoS BLACKHAT ZOMBIE AVAILABILITY APT HEADERS BLUE TEAM AI BRUTE FORCE ATTACK KILL CHAIN RED TEAM PCI ROOTKIT C2C SOCIAL ENGINEERING WHITEHAT PASSWORD THREAT HUNTING SOC CONFIDENTIALITY SPOOFING ENCRYPTION 2FA PENTEST SIEM GRAYHAT IOT EPP BREACH ON- PREM ZERO- DAY CLOUD- BASED DOMAIN DMZ WORM ATTACK SURFACE UBA BOTNET NOC EXPLOIT PUA/PUP EDR SOAR KEYLOGGER IOT PATCH PHISH PURPLE TEAM ANOMALY METADATA BYOD VPN SPEARPHISH RANSOMWARE THREAT INTELLIGENCE VULNERABILITY MACHINE LEARNING INTEGRITY HONEYPOT FIREWALL DDoS BLACKHAT ZOMBIE AVAILABILITY APT HEADERS BLUE TEAM AI BRUTE FORCE ATTACK KILL CHAIN RED TEAM PCI
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
ROOTKIT
C2C
SOCIAL ENGINEERING
WHITEHAT
PASSWORD
THREAT HUNTING
SOC
CONFIDENTIALITY
SPOOFING
ENCRYPTION
2FA
PENTEST
SIEM
GRAYHAT
IOT
EPP
BREACH
ON-PREM
ZERO-DAY
CLOUD-BASED
DOMAIN
DMZ
WORM
ATTACK SURFACE
UBA
BOTNET
NOC
EXPLOIT
PUA/PUP
EDR
SOAR
KEYLOGGER
IOT
PATCH
PHISH
PURPLE TEAM
ANOMALY
METADATA
BYOD
VPN
SPEARPHISH
RANSOMWARE
THREAT INTELLIGENCE
VULNERABILITY
MACHINE LEARNING
INTEGRITY
HONEYPOT
FIREWALL
DDoS
BLACKHAT
ZOMBIE
AVAILABILITY
APT
HEADERS
BLUE TEAM
AI
BRUTE FORCE ATTACK
KILL CHAIN
RED TEAM
PCI