Find someonewho canexplain whatpenetrationtesting is.Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Findsomeonewho knowswhatencryption is.Find someonewho has takena class at RoseState Collegebefore.findsomeonethat has acyber lab athome.Find someonewho can namea famous databreach in thelast five years.Find someonewho canname acareer path incybersecurity.Findsomeonewho canexplain whatphishing is.Find someonewho followscybersecuritynews orblogs.Findsomeonewho knowswhat a VPNis used for.Find someonewho knowshow to protectagainstransomware.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Find someonewho has takena programmingclass related tocybersecurity(like Python).Find someonewho knowswhat “CIATriad” standsfor incybersecurityFind someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho has useda virtualmachinebefore.Findsomeonethat knowswho KevenMitnick is.Find someonewho hascompleted acertification,like CompTIASecurity+.Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho haschanged theirdefault routerpassword athome.Find someonewho isinterested inlearning ethicalhacking.Findsomeonethat knowswhoSnowden is.Findsomeonewho canname a typeof malware.Find someonewho canexplain whatpenetrationtesting is.Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Findsomeonewho knowswhatencryption is.Find someonewho has takena class at RoseState Collegebefore.findsomeonethat has acyber lab athome.Find someonewho can namea famous databreach in thelast five years.Find someonewho canname acareer path incybersecurity.Findsomeonewho canexplain whatphishing is.Find someonewho followscybersecuritynews orblogs.Findsomeonewho knowswhat a VPNis used for.Find someonewho knowshow to protectagainstransomware.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Find someonewho has takena programmingclass related tocybersecurity(like Python).Find someonewho knowswhat “CIATriad” standsfor incybersecurityFind someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho has useda virtualmachinebefore.Findsomeonethat knowswho KevenMitnick is.Find someonewho hascompleted acertification,like CompTIASecurity+.Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho haschanged theirdefault routerpassword athome.Find someonewho isinterested inlearning ethicalhacking.Findsomeonethat knowswhoSnowden is.Findsomeonewho canname a typeof malware.

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Find someone who can explain what penetration testing is.
  2. Find someone who has attended a cybersecurity club meeting or event at Rose State.
  3. Find someone who has worked in IT or cybersecurity before attending Rose State.
  4. Find someone who knows what encryption is.
  5. Find someone who has taken a class at Rose State College before.
  6. find someone that has a cyber lab at home.
  7. Find someone who can name a famous data breach in the last five years.
  8. Find someone who can name a career path in cybersecurity.
  9. Find someone who can explain what phishing is.
  10. Find someone who follows cybersecurity news or blogs.
  11. Find someone who knows what a VPN is used for.
  12. Find someone who knows how to protect against ransomware.
  13. Find someone who has participated in a cybersecurity competition (e.g., CTF or cyber defense).
  14. Find someone who has taken a programming class related to cybersecurity (like Python).
  15. Find someone who knows what “CIA Triad” stands for in cybersecurity
  16. Find someone who is pursuing a cybersecurity degree at Rose State.
  17. Find someone who has used a virtual machine before.
  18. Find someone that knows who Keven Mitnick is.
  19. Find someone who has completed a certification, like CompTIA Security+.
  20. Find someone who can name a popular cybersecurity framework (e.g., NIST, ISO).
  21. Find someone who has changed their default router password at home.
  22. Find someone who is interested in learning ethical hacking.
  23. Find someone that knows who Snowden is.
  24. Find someone who can name a type of malware.