Free! VPN SQL Injection Antivirus Data Breach Penetration Testing Two-Factor Authentication (2FA) Malware Phishing Threat Hunting Patch Management Social Engineering DDoS Attack Cyber Hygiene Botnet Firewall Public Key Infrastructure (PKI) Ransomware Cyber Threat Intelligence Incident Response Dark Web Insider Threat Zero- Day Exploit Encryption Keylogger Vulnerability Free! VPN SQL Injection Antivirus Data Breach Penetration Testing Two-Factor Authentication (2FA) Malware Phishing Threat Hunting Patch Management Social Engineering DDoS Attack Cyber Hygiene Botnet Firewall Public Key Infrastructure (PKI) Ransomware Cyber Threat Intelligence Incident Response Dark Web Insider Threat Zero- Day Exploit Encryption Keylogger Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Free!
VPN
SQL Injection
Antivirus
Data Breach
Penetration Testing
Two-Factor Authentication (2FA)
Malware
Phishing
Threat Hunting
Patch Management
Social Engineering
DDoS Attack
Cyber Hygiene
Botnet
Firewall
Public Key Infrastructure (PKI)
Ransomware
Cyber Threat Intelligence
Incident Response
Dark Web
Insider Threat
Zero-Day Exploit
Encryption
Keylogger
Vulnerability