TheWebTech-nologiesScanIntrusionFirewallProxyAttachmentTrafficSurfingCyberCrimeFiltersLogServersEventsReal-timeMaliciousQuestion-ableNetworkPasswordITDepartmentAccessLinksMalwareDataThieves/TheftDefenseInfectedDatabaseSensitiveInformationThreatsTheWebTech-nologiesScanIntrusionFirewallProxyAttachmentTrafficSurfingCyberCrimeFiltersLogServersEventsReal-timeMaliciousQuestion-ableNetworkPasswordITDepartmentAccessLinksMalwareDataThieves/TheftDefenseInfectedDatabaseSensitiveInformationThreats

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. The Web
  2. Tech-nologies
  3. Scan
  4. Intrusion
  5. Firewall
  6. Proxy
  7. Attachment
  8. Traffic
  9. Surfing
  10. Cyber Crime
  11. Filters
  12. Log
  13. Servers
  14. Events
  15. Real-time
  16. Malicious
  17. Question-able
  18. Network
  19. Password
  20. IT Department
  21. Access
  22. Links
  23. Malware
  24. Data Thieves/ Theft
  25. Defense
  26. Infected
  27. Database
  28. Sensitive Information
  29. Threats