(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
find someone that has a cyber lab at home.
Find someone who can explain what phishing is.
Find someone who has worked in IT or cybersecurity before attending Rose State.
Find someone who knows what a VPN is used for.
Find someone who can name a popular cybersecurity framework (e.g., NIST, ISO).
Find someone who has taken a class at Rose State College before.
Find someone who can explain what penetration testing is.
Find someone who can name a career path in cybersecurity.
Find someone who is pursuing a cybersecurity degree at Rose State.
Find someone who has changed their default router password at home.
Find someone who knows what “CIA Triad” stands for in cybersecurity
Find someone who has used a virtual machine before.
Find someone who knows how to protect against ransomware.
Find someone who has attended a cybersecurity club meeting or event at Rose State.
Find someone who knows what encryption is.
Find someone who can name a famous data breach in the last five years.
Find someone that knows who Keven Mitnick is.
Find someone who has participated in a cybersecurity competition (e.g., CTF or cyber defense).
Find someone who has taken a programming class related to cybersecurity (like Python).
Find someone who follows cybersecurity news or blogs.
Find someone that knows who Snowden is.
Find someone who is interested in learning ethical hacking.
Find someone who has completed a certification, like CompTIA Security+.