Find someonewho knowshow to protectagainstransomware.Find someonewho has takena class at RoseState Collegebefore.Find someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho isinterested inlearning ethicalhacking.Find someonewho canexplain whatpenetrationtesting is.Find someonewho canname acareer path incybersecurity.Find someonewho knowswhat “CIATriad” standsfor incybersecurityFindsomeonethat knowswhoSnowden is.Find someonewho haschanged theirdefault routerpassword athome.Findsomeonewho canname a typeof malware.Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho can namea famous databreach in thelast five years.Find someonewho has useda virtualmachinebefore.Findsomeonewho knowswhatencryption is.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Find someonewho followscybersecuritynews orblogs.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Findsomeonethat knowswho KevenMitnick is.findsomeonethat has acyber lab athome.Findsomeonewho knowswhat a VPNis used for.Find someonewho hascompleted acertification,like CompTIASecurity+.Find someonewho has takena programmingclass related tocybersecurity(like Python).Findsomeonewho canexplain whatphishing is.Find someonewho knowshow to protectagainstransomware.Find someonewho has takena class at RoseState Collegebefore.Find someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho isinterested inlearning ethicalhacking.Find someonewho canexplain whatpenetrationtesting is.Find someonewho canname acareer path incybersecurity.Find someonewho knowswhat “CIATriad” standsfor incybersecurityFindsomeonethat knowswhoSnowden is.Find someonewho haschanged theirdefault routerpassword athome.Findsomeonewho canname a typeof malware.Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho can namea famous databreach in thelast five years.Find someonewho has useda virtualmachinebefore.Findsomeonewho knowswhatencryption is.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Find someonewho followscybersecuritynews orblogs.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Findsomeonethat knowswho KevenMitnick is.findsomeonethat has acyber lab athome.Findsomeonewho knowswhat a VPNis used for.Find someonewho hascompleted acertification,like CompTIASecurity+.Find someonewho has takena programmingclass related tocybersecurity(like Python).Findsomeonewho canexplain whatphishing is.

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Find someone who knows how to protect against ransomware.
  2. Find someone who has taken a class at Rose State College before.
  3. Find someone who is pursuing a cybersecurity degree at Rose State.
  4. Find someone who is interested in learning ethical hacking.
  5. Find someone who can explain what penetration testing is.
  6. Find someone who can name a career path in cybersecurity.
  7. Find someone who knows what “CIA Triad” stands for in cybersecurity
  8. Find someone that knows who Snowden is.
  9. Find someone who has changed their default router password at home.
  10. Find someone who can name a type of malware.
  11. Find someone who can name a popular cybersecurity framework (e.g., NIST, ISO).
  12. Find someone who can name a famous data breach in the last five years.
  13. Find someone who has used a virtual machine before.
  14. Find someone who knows what encryption is.
  15. Find someone who has worked in IT or cybersecurity before attending Rose State.
  16. Find someone who follows cybersecurity news or blogs.
  17. Find someone who has participated in a cybersecurity competition (e.g., CTF or cyber defense).
  18. Find someone who has attended a cybersecurity club meeting or event at Rose State.
  19. Find someone that knows who Keven Mitnick is.
  20. find someone that has a cyber lab at home.
  21. Find someone who knows what a VPN is used for.
  22. Find someone who has completed a certification, like CompTIA Security+.
  23. Find someone who has taken a programming class related to cybersecurity (like Python).
  24. Find someone who can explain what phishing is.