DataDiscoverySSLDecryptRespondAdvancedPersistentThreatDetectRiskAssessmentAntivirusRecoverMalwarePatchManagementVPNPhishingSecurePasswordSecureEmailLeastPrivilegePassPhaseFirewallProtectSpearPhishingIdentifyTypesofHackersAssetManagementSecurityAwarenessTrainingTwo-FactorAuthenticationDataDiscoverySSLDecryptRespondAdvancedPersistentThreatDetectRiskAssessmentAntivirusRecoverMalwarePatchManagementVPNPhishingSecurePasswordSecureEmailLeastPrivilegePassPhaseFirewallProtectSpearPhishingIdentifyTypesofHackersAssetManagementSecurityAwarenessTrainingTwo-FactorAuthentication

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Data Discovery
  2. SSL Decrypt
  3. Respond
  4. Advanced Persistent Threat
  5. Detect
  6. Risk Assessment
  7. Antivirus
  8. Recover
  9. Malware
  10. Patch Management
  11. VPN
  12. Phishing
  13. Secure Password
  14. Secure Email
  15. Least Privilege
  16. PassPhase
  17. Firewall
  18. Protect
  19. Spear Phishing
  20. Identify
  21. Types of Hackers
  22. Asset Management
  23. Security Awareness Training
  24. Two-Factor Authentication