Has builttheir ownfirewallHas acertification(e.g., CompTIASecurity+,CISSP)Hasparticipated ina Capture theFlag (CTF)competitionHasattended acybersecurityjob fairKnowshow toprogramin PythonCompleted acybersecurityinternshipHas apart-time jobHas apet athomeCanspeakmultiplelanguagesReadscybersecuritynews dailyAttended aDEFCON orBlack HatconferenceUses apasswordmanagerUses Linuxas their mainoperatingsystemPlays aninstrumentHasreceived aransomwareattackHascontributed toopen-sourcesecurityprojectsFree!Uses multi-factorauthenticationon mostaccountsIsdouble-majoringHas taken acourse incryptography Is a non-STEMmajorHasreverse-engineeredmalwareIs afreshmanHas set up ahome lab forcybersecurityHasexperienceda phishingattackHas builttheir ownfirewallHas acertification(e.g., CompTIASecurity+,CISSP)Hasparticipated ina Capture theFlag (CTF)competitionHasattended acybersecurityjob fairKnowshow toprogramin PythonCompleted acybersecurityinternshipHas apart-time jobHas apet athomeCanspeakmultiplelanguagesReadscybersecuritynews dailyAttended aDEFCON orBlack HatconferenceUses apasswordmanagerUses Linuxas their mainoperatingsystemPlays aninstrumentHasreceived aransomwareattackHascontributed toopen-sourcesecurityprojectsFree!Uses multi-factorauthenticationon mostaccountsIsdouble-majoringHas taken acourse incryptography Is a non-STEMmajorHasreverse-engineeredmalwareIs afreshmanHas set up ahome lab forcybersecurityHasexperienceda phishingattack

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
  1. Has built their own firewall
  2. Has a certification (e.g., CompTIA Security+, CISSP)
  3. Has participated in a Capture the Flag (CTF) competition
  4. Has attended a cybersecurity job fair
  5. Knows how to program in Python
  6. Completed a cybersecurity internship
  7. Has a part-time job
  8. Has a pet at home
  9. Can speak multiple languages
  10. Reads cybersecurity news daily
  11. Attended a DEFCON or Black Hat conference
  12. Uses a password manager
  13. Uses Linux as their main operating system
  14. Plays an instrument
  15. Has received a ransomware attack
  16. Has contributed to open-source security projects
  17. Free!
  18. Uses multi-factor authentication on most accounts
  19. Is double-majoring
  20. Has taken a course in cryptography
  21. Is a non-STEM major
  22. Has reverse-engineered malware
  23. Is a freshman
  24. Has set up a home lab for cybersecurity
  25. Has experienced a phishing attack