Has builttheir ownfirewallIsdouble-majoringHascontributed toopen-sourcesecurityprojectsCanspeakmultiplelanguagesCompleted acybersecurityinternshipIs afreshmanUses multi-factorauthenticationon mostaccountsKnowshow toprogramin PythonUses Linuxas their mainoperatingsystemHas set up ahome lab forcybersecurityReadscybersecuritynews dailyHasattended acybersecurityjob fairAttended aDEFCON orBlack HatconferenceIs a non-STEMmajorHas apet athomeHasexperienceda phishingattackPlays aninstrumentHasreverse-engineeredmalwareHasparticipated ina Capture theFlag (CTF)competitionUses apasswordmanagerHas acertification(e.g., CompTIASecurity+,CISSP)Has apart-time jobHasreceived aransomwareattackHas taken acourse incryptographyHas builttheir ownfirewallIsdouble-majoringHascontributed toopen-sourcesecurityprojectsCanspeakmultiplelanguagesCompleted acybersecurityinternshipIs afreshmanUses multi-factorauthenticationon mostaccountsKnowshow toprogramin PythonUses Linuxas their mainoperatingsystemHas set up ahome lab forcybersecurityReadscybersecuritynews dailyHasattended acybersecurityjob fairAttended aDEFCON orBlack HatconferenceIs a non-STEMmajorHas apet athomeHasexperienceda phishingattackPlays aninstrumentHasreverse-engineeredmalwareHasparticipated ina Capture theFlag (CTF)competitionUses apasswordmanagerHas acertification(e.g., CompTIASecurity+,CISSP)Has apart-time jobHasreceived aransomwareattackHas taken acourse incryptography

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Has built their own firewall
  2. Is double-majoring
  3. Has contributed to open-source security projects
  4. Can speak multiple languages
  5. Completed a cybersecurity internship
  6. Is a freshman
  7. Uses multi-factor authentication on most accounts
  8. Knows how to program in Python
  9. Uses Linux as their main operating system
  10. Has set up a home lab for cybersecurity
  11. Reads cybersecurity news daily
  12. Has attended a cybersecurity job fair
  13. Attended a DEFCON or Black Hat conference
  14. Is a non-STEM major
  15. Has a pet at home
  16. Has experienced a phishing attack
  17. Plays an instrument
  18. Has reverse-engineered malware
  19. Has participated in a Capture the Flag (CTF) competition
  20. Uses a password manager
  21. Has a certification (e.g., CompTIA Security+, CISSP)
  22. Has a part-time job
  23. Has received a ransomware attack
  24. Has taken a course in cryptography