SecurityAwarenessTrainingSecurePasswordMalwareIdentifyAntivirusTwo-FactorAuthenticationSecureEmailVPNAssetManagementLeastPrivilegePassPhasePhishingDetectSSLDecryptDataDiscoveryFirewallProtectAdvancedPersistentThreatRecoverTypesofHackersPatchManagementSpearPhishingRespondRiskAssessmentSecurityAwarenessTrainingSecurePasswordMalwareIdentifyAntivirusTwo-FactorAuthenticationSecureEmailVPNAssetManagementLeastPrivilegePassPhasePhishingDetectSSLDecryptDataDiscoveryFirewallProtectAdvancedPersistentThreatRecoverTypesofHackersPatchManagementSpearPhishingRespondRiskAssessment

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Security Awareness Training
  2. Secure Password
  3. Malware
  4. Identify
  5. Antivirus
  6. Two-Factor Authentication
  7. Secure Email
  8. VPN
  9. Asset Management
  10. Least Privilege
  11. PassPhase
  12. Phishing
  13. Detect
  14. SSL Decrypt
  15. Data Discovery
  16. Firewall
  17. Protect
  18. Advanced Persistent Threat
  19. Recover
  20. Types of Hackers
  21. Patch Management
  22. Spear Phishing
  23. Respond
  24. Risk Assessment