NetworkTheWebDefenseIntrusionAccessTech-nologiesThreatsProxyAttachmentLogDatabaseQuestion-ableInfectedCyberCrimeMaliciousITDepartmentTrafficPasswordDataThieves/TheftReal-timeLinksFiltersSurfingSensitiveInformationEventsScanFirewallMalwareServersNetworkTheWebDefenseIntrusionAccessTech-nologiesThreatsProxyAttachmentLogDatabaseQuestion-ableInfectedCyberCrimeMaliciousITDepartmentTrafficPasswordDataThieves/TheftReal-timeLinksFiltersSurfingSensitiveInformationEventsScanFirewallMalwareServers

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Network
  2. The Web
  3. Defense
  4. Intrusion
  5. Access
  6. Tech-nologies
  7. Threats
  8. Proxy
  9. Attachment
  10. Log
  11. Database
  12. Question-able
  13. Infected
  14. Cyber Crime
  15. Malicious
  16. IT Department
  17. Traffic
  18. Password
  19. Data Thieves/ Theft
  20. Real-time
  21. Links
  22. Filters
  23. Surfing
  24. Sensitive Information
  25. Events
  26. Scan
  27. Firewall
  28. Malware
  29. Servers