DatabaseFirewallCyberCrimeInfectedThreatsReal-timeNetworkSensitiveInformationMaliciousIntrusionITDepartmentAttachmentAccessPasswordMalwareProxyLinksTech-nologiesServersDataThieves/TheftFiltersLogDefenseEventsSurfingTheWebQuestion-ableTrafficScanDatabaseFirewallCyberCrimeInfectedThreatsReal-timeNetworkSensitiveInformationMaliciousIntrusionITDepartmentAttachmentAccessPasswordMalwareProxyLinksTech-nologiesServersDataThieves/TheftFiltersLogDefenseEventsSurfingTheWebQuestion-ableTrafficScan

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Database
  2. Firewall
  3. Cyber Crime
  4. Infected
  5. Threats
  6. Real-time
  7. Network
  8. Sensitive Information
  9. Malicious
  10. Intrusion
  11. IT Department
  12. Attachment
  13. Access
  14. Password
  15. Malware
  16. Proxy
  17. Links
  18. Tech-nologies
  19. Servers
  20. Data Thieves/ Theft
  21. Filters
  22. Log
  23. Defense
  24. Events
  25. Surfing
  26. The Web
  27. Question-able
  28. Traffic
  29. Scan