Find someonewho haschanged theirdefault routerpassword athome.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Findsomeonewho canexplain whatphishing is.Findsomeonewho canname a typeof malware.Find someonewho can namea famous databreach in thelast five years.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Findsomeonewho knowswhatencryption is.Find someonewho isinterested inlearning ethicalhacking.Find someonewho canexplain whatpenetrationtesting is.Findsomeonethat knowswhoSnowden is.Find someonewho has takena class at RoseState Collegebefore.Find someonewho knowswhat “CIATriad” standsfor incybersecurityfindsomeonethat has acyber lab athome.Find someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho knowshow to protectagainstransomware.Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Findsomeonethat knowswho KevenMitnick is.Find someonewho has useda virtualmachinebefore.Find someonewho followscybersecuritynews orblogs.Find someonewho hascompleted acertification,like CompTIASecurity+.Findsomeonewho knowswhat a VPNis used for.Find someonewho has takena programmingclass related tocybersecurity(like Python).Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho canname acareer path incybersecurity.Find someonewho haschanged theirdefault routerpassword athome.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Findsomeonewho canexplain whatphishing is.Findsomeonewho canname a typeof malware.Find someonewho can namea famous databreach in thelast five years.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Findsomeonewho knowswhatencryption is.Find someonewho isinterested inlearning ethicalhacking.Find someonewho canexplain whatpenetrationtesting is.Findsomeonethat knowswhoSnowden is.Find someonewho has takena class at RoseState Collegebefore.Find someonewho knowswhat “CIATriad” standsfor incybersecurityfindsomeonethat has acyber lab athome.Find someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho knowshow to protectagainstransomware.Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Findsomeonethat knowswho KevenMitnick is.Find someonewho has useda virtualmachinebefore.Find someonewho followscybersecuritynews orblogs.Find someonewho hascompleted acertification,like CompTIASecurity+.Findsomeonewho knowswhat a VPNis used for.Find someonewho has takena programmingclass related tocybersecurity(like Python).Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho canname acareer path incybersecurity.

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Find someone who has changed their default router password at home.
  2. Find someone who has worked in IT or cybersecurity before attending Rose State.
  3. Find someone who can explain what phishing is.
  4. Find someone who can name a type of malware.
  5. Find someone who can name a famous data breach in the last five years.
  6. Find someone who has participated in a cybersecurity competition (e.g., CTF or cyber defense).
  7. Find someone who knows what encryption is.
  8. Find someone who is interested in learning ethical hacking.
  9. Find someone who can explain what penetration testing is.
  10. Find someone that knows who Snowden is.
  11. Find someone who has taken a class at Rose State College before.
  12. Find someone who knows what “CIA Triad” stands for in cybersecurity
  13. find someone that has a cyber lab at home.
  14. Find someone who is pursuing a cybersecurity degree at Rose State.
  15. Find someone who knows how to protect against ransomware.
  16. Find someone who has attended a cybersecurity club meeting or event at Rose State.
  17. Find someone that knows who Keven Mitnick is.
  18. Find someone who has used a virtual machine before.
  19. Find someone who follows cybersecurity news or blogs.
  20. Find someone who has completed a certification, like CompTIA Security+.
  21. Find someone who knows what a VPN is used for.
  22. Find someone who has taken a programming class related to cybersecurity (like Python).
  23. Find someone who can name a popular cybersecurity framework (e.g., NIST, ISO).
  24. Find someone who can name a career path in cybersecurity.