AntivirusspearphishingRiskAssessmentsmishingZeroDay DataDiscoveryRecoverPassPhaseSecurityAwarenessTrainingFirewallIdentifySpearPhishingSecurePasswordVishingSecureEmailPatchManagementRespondTypesofHackersMalwareTwo-FactorAuthenticationVPNWhalingAdvancedPersistentThreatDetectProtectPhishingSSLDecryptLeastPrivilegeAssetManagementAntivirusspearphishingRiskAssessmentsmishingZeroDay DataDiscoveryRecoverPassPhaseSecurityAwarenessTrainingFirewallIdentifySpearPhishingSecurePasswordVishingSecureEmailPatchManagementRespondTypesofHackersMalwareTwo-FactorAuthenticationVPNWhalingAdvancedPersistentThreatDetectProtectPhishingSSLDecryptLeastPrivilegeAssetManagement

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
  1. Antivirus
  2. spearphishing
  3. Risk Assessment
  4. smishing
  5. Zero Day
  6. Data Discovery
  7. Recover
  8. PassPhase
  9. Security Awareness Training
  10. Firewall
  11. Identify
  12. Spear Phishing
  13. Secure Password
  14. Vishing
  15. Secure Email
  16. Patch Management
  17. Respond
  18. Types of Hackers
  19. Malware
  20. Two-Factor Authentication
  21. VPN
  22. Whaling
  23. Advanced Persistent Threat
  24. Detect
  25. Protect
  26. Phishing
  27. SSL Decrypt
  28. Least Privilege
  29. Asset Management