Antivirus Malware Firewall SQL Injection Zero- Day Exploit Penetration Testing Patch Management Vulnerability VPN DDoS Attack Free! Keylogger Incident Response Data Breach Two-Factor Authentication (2FA) Cyber Threat Intelligence Social Engineering Threat Hunting Dark Web Encryption Botnet Ransomware Phishing Public Key Infrastructure (PKI) Cyber Hygiene Insider Threat Antivirus Malware Firewall SQL Injection Zero- Day Exploit Penetration Testing Patch Management Vulnerability VPN DDoS Attack Free! Keylogger Incident Response Data Breach Two-Factor Authentication (2FA) Cyber Threat Intelligence Social Engineering Threat Hunting Dark Web Encryption Botnet Ransomware Phishing Public Key Infrastructure (PKI) Cyber Hygiene Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Antivirus
Malware
Firewall
SQL Injection
Zero-Day Exploit
Penetration Testing
Patch Management
Vulnerability
VPN
DDoS Attack
Free!
Keylogger
Incident Response
Data Breach
Two-Factor Authentication (2FA)
Cyber Threat Intelligence
Social Engineering
Threat Hunting
Dark Web
Encryption
Botnet
Ransomware
Phishing
Public Key Infrastructure (PKI)
Cyber Hygiene
Insider Threat