DefenseEventsInfectedIntrusionFiltersDataThieves/TheftFirewallAccessProxyThreatsDatabaseTech-nologiesITDepartmentMaliciousAttachmentReal-timeMalwareTheWebServersTrafficCyberCrimeSurfingScanQuestion-ableLogPasswordLinksSensitiveInformationNetworkDefenseEventsInfectedIntrusionFiltersDataThieves/TheftFirewallAccessProxyThreatsDatabaseTech-nologiesITDepartmentMaliciousAttachmentReal-timeMalwareTheWebServersTrafficCyberCrimeSurfingScanQuestion-ableLogPasswordLinksSensitiveInformationNetwork

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Defense
  2. Events
  3. Infected
  4. Intrusion
  5. Filters
  6. Data Thieves/ Theft
  7. Firewall
  8. Access
  9. Proxy
  10. Threats
  11. Database
  12. Tech-nologies
  13. IT Department
  14. Malicious
  15. Attachment
  16. Real-time
  17. Malware
  18. The Web
  19. Servers
  20. Traffic
  21. Cyber Crime
  22. Surfing
  23. Scan
  24. Question-able
  25. Log
  26. Password
  27. Links
  28. Sensitive Information
  29. Network