ZeroDay TypesofHackersRecoversmishingTwo-FactorAuthenticationSSLDecryptProtectPassPhaseDetectFirewallSecureEmailPhishingSecurePasswordSecurityAwarenessTrainingIdentifyVPNRiskAssessmentLeastPrivilegePatchManagementRespondAdvancedPersistentThreatVishingSpearPhishingAssetManagementDataDiscoveryMalwareAntivirusWhalingspearphishingZeroDay TypesofHackersRecoversmishingTwo-FactorAuthenticationSSLDecryptProtectPassPhaseDetectFirewallSecureEmailPhishingSecurePasswordSecurityAwarenessTrainingIdentifyVPNRiskAssessmentLeastPrivilegePatchManagementRespondAdvancedPersistentThreatVishingSpearPhishingAssetManagementDataDiscoveryMalwareAntivirusWhalingspearphishing

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Zero Day
  2. Types of Hackers
  3. Recover
  4. smishing
  5. Two-Factor Authentication
  6. SSL Decrypt
  7. Protect
  8. PassPhase
  9. Detect
  10. Firewall
  11. Secure Email
  12. Phishing
  13. Secure Password
  14. Security Awareness Training
  15. Identify
  16. VPN
  17. Risk Assessment
  18. Least Privilege
  19. Patch Management
  20. Respond
  21. Advanced Persistent Threat
  22. Vishing
  23. Spear Phishing
  24. Asset Management
  25. Data Discovery
  26. Malware
  27. Antivirus
  28. Whaling
  29. spearphishing