SensitiveInformationIntrusionLinksMalwareTheWebLogDataThieves/TheftFiltersDefenseCyberCrimeServersScanProxyPasswordInfectedFirewallMaliciousITDepartmentTrafficQuestion-ableAccessTech-nologiesEventsThreatsReal-timeDatabaseSurfingAttachmentNetworkSensitiveInformationIntrusionLinksMalwareTheWebLogDataThieves/TheftFiltersDefenseCyberCrimeServersScanProxyPasswordInfectedFirewallMaliciousITDepartmentTrafficQuestion-ableAccessTech-nologiesEventsThreatsReal-timeDatabaseSurfingAttachmentNetwork

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Sensitive Information
  2. Intrusion
  3. Links
  4. Malware
  5. The Web
  6. Log
  7. Data Thieves/ Theft
  8. Filters
  9. Defense
  10. Cyber Crime
  11. Servers
  12. Scan
  13. Proxy
  14. Password
  15. Infected
  16. Firewall
  17. Malicious
  18. IT Department
  19. Traffic
  20. Question-able
  21. Access
  22. Tech-nologies
  23. Events
  24. Threats
  25. Real-time
  26. Database
  27. Surfing
  28. Attachment
  29. Network