SSLDecryptsmishingMalwareAdvancedPersistentThreatRespondPassPhaseRiskAssessmentVPNSpearPhishingDataDiscoveryspearphishingAssetManagementAntivirusDetectSecurePasswordTypesofHackersLeastPrivilegeProtectFirewallRecoverZeroDay VishingSecureEmailTwo-FactorAuthenticationIdentifyWhalingPatchManagementPhishingSecurityAwarenessTrainingSSLDecryptsmishingMalwareAdvancedPersistentThreatRespondPassPhaseRiskAssessmentVPNSpearPhishingDataDiscoveryspearphishingAssetManagementAntivirusDetectSecurePasswordTypesofHackersLeastPrivilegeProtectFirewallRecoverZeroDay VishingSecureEmailTwo-FactorAuthenticationIdentifyWhalingPatchManagementPhishingSecurityAwarenessTraining

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. SSL Decrypt
  2. smishing
  3. Malware
  4. Advanced Persistent Threat
  5. Respond
  6. PassPhase
  7. Risk Assessment
  8. VPN
  9. Spear Phishing
  10. Data Discovery
  11. spearphishing
  12. Asset Management
  13. Antivirus
  14. Detect
  15. Secure Password
  16. Types of Hackers
  17. Least Privilege
  18. Protect
  19. Firewall
  20. Recover
  21. Zero Day
  22. Vishing
  23. Secure Email
  24. Two-Factor Authentication
  25. Identify
  26. Whaling
  27. Patch Management
  28. Phishing
  29. Security Awareness Training