PhishingSecurePasswordVPNIdentifyRecoverFirewallRespondSecurityAwarenessTrainingAssetManagementProtectAntivirusDetectLeastPrivilegeTypesofHackersSecureEmailPatchManagementRiskAssessmentSSLDecryptSpearPhishingDataDiscoveryMalwareTwo-FactorAuthenticationPassPhaseAdvancedPersistentThreatPhishingSecurePasswordVPNIdentifyRecoverFirewallRespondSecurityAwarenessTrainingAssetManagementProtectAntivirusDetectLeastPrivilegeTypesofHackersSecureEmailPatchManagementRiskAssessmentSSLDecryptSpearPhishingDataDiscoveryMalwareTwo-FactorAuthenticationPassPhaseAdvancedPersistentThreat

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Phishing
  2. Secure Password
  3. VPN
  4. Identify
  5. Recover
  6. Firewall
  7. Respond
  8. Security Awareness Training
  9. Asset Management
  10. Protect
  11. Antivirus
  12. Detect
  13. Least Privilege
  14. Types of Hackers
  15. Secure Email
  16. Patch Management
  17. Risk Assessment
  18. SSL Decrypt
  19. Spear Phishing
  20. Data Discovery
  21. Malware
  22. Two-Factor Authentication
  23. PassPhase
  24. Advanced Persistent Threat