Antivirus Advanced Persistent Threat VPN Two-Factor Authentication Risk Assessment Recover Types of Hackers Patch Management smishing Spear Phishing Vishing Phishing spearphishing Identify Whaling PassPhase Data Discovery Asset Management Firewall Detect Protect Least Privilege Malware Secure Email Secure Password Zero Day Respond Security Awareness Training SSL Decrypt Antivirus Advanced Persistent Threat VPN Two-Factor Authentication Risk Assessment Recover Types of Hackers Patch Management smishing Spear Phishing Vishing Phishing spearphishing Identify Whaling PassPhase Data Discovery Asset Management Firewall Detect Protect Least Privilege Malware Secure Email Secure Password Zero Day Respond Security Awareness Training SSL Decrypt
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Antivirus
Advanced Persistent Threat
VPN
Two-Factor Authentication
Risk Assessment
Recover
Types of Hackers
Patch Management
smishing
Spear Phishing
Vishing
Phishing
spearphishing
Identify
Whaling
PassPhase
Data Discovery
Asset Management
Firewall
Detect
Protect
Least Privilege
Malware
Secure Email
Secure Password
Zero Day
Respond
Security Awareness Training
SSL Decrypt