LogThreatsDatabaseIntrusionDataThieves/TheftFiltersQuestion-ableLinksTheWebNetworkAttachmentPasswordSensitiveInformationITDepartmentDefenseFirewallSurfingTrafficCyberCrimeInfectedServersAccessEventsMaliciousScanProxyReal-timeMalwareTech-nologiesLogThreatsDatabaseIntrusionDataThieves/TheftFiltersQuestion-ableLinksTheWebNetworkAttachmentPasswordSensitiveInformationITDepartmentDefenseFirewallSurfingTrafficCyberCrimeInfectedServersAccessEventsMaliciousScanProxyReal-timeMalwareTech-nologies

Cyber Security Training Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Log
  2. Threats
  3. Database
  4. Intrusion
  5. Data Thieves/ Theft
  6. Filters
  7. Question-able
  8. Links
  9. The Web
  10. Network
  11. Attachment
  12. Password
  13. Sensitive Information
  14. IT Department
  15. Defense
  16. Firewall
  17. Surfing
  18. Traffic
  19. Cyber Crime
  20. Infected
  21. Servers
  22. Access
  23. Events
  24. Malicious
  25. Scan
  26. Proxy
  27. Real-time
  28. Malware
  29. Tech-nologies