findsomeonethat has acyber lab athome.Findsomeonewho canexplain whatphishing is.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Findsomeonewho knowswhat a VPNis used for.Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho has takena class at RoseState Collegebefore.Find someonewho canexplain whatpenetrationtesting is.Find someonewho canname acareer path incybersecurity.Find someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho haschanged theirdefault routerpassword athome.Find someonewho knowswhat “CIATriad” standsfor incybersecurityFind someonewho has useda virtualmachinebefore.Find someonewho knowshow to protectagainstransomware.Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Findsomeonewho knowswhatencryption is.Find someonewho can namea famous databreach in thelast five years.Findsomeonethat knowswho KevenMitnick is.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Find someonewho has takena programmingclass related tocybersecurity(like Python).Find someonewho followscybersecuritynews orblogs.Findsomeonethat knowswhoSnowden is.Find someonewho isinterested inlearning ethicalhacking.Find someonewho hascompleted acertification,like CompTIASecurity+.Findsomeonewho canname a typeof malware.findsomeonethat has acyber lab athome.Findsomeonewho canexplain whatphishing is.Find someonewho has workedin IT orcybersecuritybefore attendingRose State.Findsomeonewho knowswhat a VPNis used for.Find someonewho can name apopularcybersecurityframework (e.g.,NIST, ISO).Find someonewho has takena class at RoseState Collegebefore.Find someonewho canexplain whatpenetrationtesting is.Find someonewho canname acareer path incybersecurity.Find someonewho is pursuinga cybersecuritydegree at RoseState.Find someonewho haschanged theirdefault routerpassword athome.Find someonewho knowswhat “CIATriad” standsfor incybersecurityFind someonewho has useda virtualmachinebefore.Find someonewho knowshow to protectagainstransomware.Find someonewho has attendeda cybersecurityclub meeting orevent at RoseState.Findsomeonewho knowswhatencryption is.Find someonewho can namea famous databreach in thelast five years.Findsomeonethat knowswho KevenMitnick is.Find someonewho hasparticipated in acybersecuritycompetition (e.g.,CTF or cyberdefense).Find someonewho has takena programmingclass related tocybersecurity(like Python).Find someonewho followscybersecuritynews orblogs.Findsomeonethat knowswhoSnowden is.Find someonewho isinterested inlearning ethicalhacking.Find someonewho hascompleted acertification,like CompTIASecurity+.Findsomeonewho canname a typeof malware.

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. find someone that has a cyber lab at home.
  2. Find someone who can explain what phishing is.
  3. Find someone who has worked in IT or cybersecurity before attending Rose State.
  4. Find someone who knows what a VPN is used for.
  5. Find someone who can name a popular cybersecurity framework (e.g., NIST, ISO).
  6. Find someone who has taken a class at Rose State College before.
  7. Find someone who can explain what penetration testing is.
  8. Find someone who can name a career path in cybersecurity.
  9. Find someone who is pursuing a cybersecurity degree at Rose State.
  10. Find someone who has changed their default router password at home.
  11. Find someone who knows what “CIA Triad” stands for in cybersecurity
  12. Find someone who has used a virtual machine before.
  13. Find someone who knows how to protect against ransomware.
  14. Find someone who has attended a cybersecurity club meeting or event at Rose State.
  15. Find someone who knows what encryption is.
  16. Find someone who can name a famous data breach in the last five years.
  17. Find someone that knows who Keven Mitnick is.
  18. Find someone who has participated in a cybersecurity competition (e.g., CTF or cyber defense).
  19. Find someone who has taken a programming class related to cybersecurity (like Python).
  20. Find someone who follows cybersecurity news or blogs.
  21. Find someone that knows who Snowden is.
  22. Find someone who is interested in learning ethical hacking.
  23. Find someone who has completed a certification, like CompTIA Security+.
  24. Find someone who can name a type of malware.