FIREWALL CLOUD- BASED IOT METADATA SPOOFING SOC VULNERABILITY BRUTE FORCE ATTACK EPP HEADERS SOCIAL ENGINEERING DMZ RANSOMWARE BLACKHAT HONEYPOT AI PUA/PUP ROOTKIT ANOMALY IOT KEYLOGGER UBA ZERO- DAY GRAYHAT PENTEST VPN ENCRYPTION DOMAIN EXPLOIT PATCH BLUE TEAM EDR RED TEAM PHISH ATTACK SURFACE BOTNET PASSWORD PCI INTEGRITY SOAR ON- PREM MACHINE LEARNING WHITEHAT BREACH DDoS C2C PURPLE TEAM WORM THREAT HUNTING CONFIDENTIALITY APT AVAILABILITY BYOD 2FA KILL CHAIN ZOMBIE THREAT INTELLIGENCE NOC SIEM SPEARPHISH FIREWALL CLOUD- BASED IOT METADATA SPOOFING SOC VULNERABILITY BRUTE FORCE ATTACK EPP HEADERS SOCIAL ENGINEERING DMZ RANSOMWARE BLACKHAT HONEYPOT AI PUA/PUP ROOTKIT ANOMALY IOT KEYLOGGER UBA ZERO- DAY GRAYHAT PENTEST VPN ENCRYPTION DOMAIN EXPLOIT PATCH BLUE TEAM EDR RED TEAM PHISH ATTACK SURFACE BOTNET PASSWORD PCI INTEGRITY SOAR ON- PREM MACHINE LEARNING WHITEHAT BREACH DDoS C2C PURPLE TEAM WORM THREAT HUNTING CONFIDENTIALITY APT AVAILABILITY BYOD 2FA KILL CHAIN ZOMBIE THREAT INTELLIGENCE NOC SIEM SPEARPHISH
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
FIREWALL
CLOUD-BASED
IOT
METADATA
SPOOFING
SOC
VULNERABILITY
BRUTE FORCE ATTACK
EPP
HEADERS
SOCIAL ENGINEERING
DMZ
RANSOMWARE
BLACKHAT
HONEYPOT
AI
PUA/PUP
ROOTKIT
ANOMALY
IOT
KEYLOGGER
UBA
ZERO-DAY
GRAYHAT
PENTEST
VPN
ENCRYPTION
DOMAIN
EXPLOIT
PATCH
BLUE TEAM
EDR
RED TEAM
PHISH
ATTACK SURFACE
BOTNET
PASSWORD
PCI
INTEGRITY
SOAR
ON-PREM
MACHINE LEARNING
WHITEHAT
BREACH
DDoS
C2C
PURPLE TEAM
WORM
THREAT HUNTING
CONFIDENTIALITY
APT
AVAILABILITY
BYOD
2FA
KILL CHAIN
ZOMBIE
THREAT INTELLIGENCE
NOC
SIEM
SPEARPHISH