PenetrationTestingDarkWebFirewallKeyloggerDDoSAttackPhishingCyberThreatIntelligenceTwo-FactorAuthentication(2FA)EncryptionSQLInjectionSocialEngineeringFree!DataBreachAntivirusInsiderThreatPublic KeyInfrastructure(PKI)CyberHygieneZero-DayExploitRansomwarePatchManagementVPNMalwareIncidentResponseBotnetThreatHuntingVulnerabilityPenetrationTestingDarkWebFirewallKeyloggerDDoSAttackPhishingCyberThreatIntelligenceTwo-FactorAuthentication(2FA)EncryptionSQLInjectionSocialEngineeringFree!DataBreachAntivirusInsiderThreatPublic KeyInfrastructure(PKI)CyberHygieneZero-DayExploitRansomwarePatchManagementVPNMalwareIncidentResponseBotnetThreatHuntingVulnerability

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. Penetration Testing
  2. Dark Web
  3. Firewall
  4. Keylogger
  5. DDoS Attack
  6. Phishing
  7. Cyber Threat Intelligence
  8. Two-Factor Authentication (2FA)
  9. Encryption
  10. SQL Injection
  11. Social Engineering
  12. Free!
  13. Data Breach
  14. Antivirus
  15. Insider Threat
  16. Public Key Infrastructure (PKI)
  17. Cyber Hygiene
  18. Zero-Day Exploit
  19. Ransomware
  20. Patch Management
  21. VPN
  22. Malware
  23. Incident Response
  24. Botnet
  25. Threat Hunting
  26. Vulnerability