Has built their own firewall Has a certification (e.g., CompTIA Security+, CISSP) Has participated in a Capture the Flag (CTF) competition Has attended a cybersecurity job fair Knows how to program in Python Completed a cybersecurity internship Has a part- time job Has a pet at home Can speak multiple languages Reads cybersecurity news daily Attended a DEFCON or Black Hat conference Uses a password manager Uses Linux as their main operating system Plays an instrument Has received a ransomware attack Has contributed to open-source security projects Free! Uses multi- factor authentication on most accounts Is double- majoring Has taken a course in cryptography Is a non- STEM major Has reverse- engineered malware Is a freshman Has set up a home lab for cybersecurity Has experienced a phishing attack Has built their own firewall Has a certification (e.g., CompTIA Security+, CISSP) Has participated in a Capture the Flag (CTF) competition Has attended a cybersecurity job fair Knows how to program in Python Completed a cybersecurity internship Has a part- time job Has a pet at home Can speak multiple languages Reads cybersecurity news daily Attended a DEFCON or Black Hat conference Uses a password manager Uses Linux as their main operating system Plays an instrument Has received a ransomware attack Has contributed to open-source security projects Free! Uses multi- factor authentication on most accounts Is double- majoring Has taken a course in cryptography Is a non- STEM major Has reverse- engineered malware Is a freshman Has set up a home lab for cybersecurity Has experienced a phishing attack
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Has built their own firewall
Has a certification (e.g., CompTIA Security+, CISSP)
Has participated in a Capture the Flag (CTF) competition
Has attended a cybersecurity job fair
Knows how to program in Python
Completed a cybersecurity internship
Has a part-time job
Has a pet at home
Can speak multiple languages
Reads cybersecurity news daily
Attended a DEFCON or Black Hat conference
Uses a password manager
Uses Linux as their main operating system
Plays an instrument
Has received a ransomware attack
Has contributed to open-source security projects
Free!
Uses multi-factor authentication on most accounts
Is double-majoring
Has taken a course in cryptography
Is a non-STEM major
Has reverse-engineered malware
Is a freshman
Has set up a home lab for cybersecurity
Has experienced a phishing attack