CyberCrimeInfectedServersTrafficThreatsSurfingDataThieves/TheftNetworkAttachmentLogPasswordMalwareEventsIntrusionDefenseQuestion-ableSensitiveInformationFiltersTech-nologiesFirewallTheWebDatabaseITDepartmentAccessProxyMaliciousLinksScanReal-timeCyberCrimeInfectedServersTrafficThreatsSurfingDataThieves/TheftNetworkAttachmentLogPasswordMalwareEventsIntrusionDefenseQuestion-ableSensitiveInformationFiltersTech-nologiesFirewallTheWebDatabaseITDepartmentAccessProxyMaliciousLinksScanReal-time

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Cyber Crime
  2. Infected
  3. Servers
  4. Traffic
  5. Threats
  6. Surfing
  7. Data Thieves/ Theft
  8. Network
  9. Attachment
  10. Log
  11. Password
  12. Malware
  13. Events
  14. Intrusion
  15. Defense
  16. Question-able
  17. Sensitive Information
  18. Filters
  19. Tech-nologies
  20. Firewall
  21. The Web
  22. Database
  23. IT Department
  24. Access
  25. Proxy
  26. Malicious
  27. Links
  28. Scan
  29. Real-time