SQL Injection DDoS Attack Antivirus Keylogger Two-Factor Authentication (2FA) Dark Web Encryption Penetration Testing Zero- Day Exploit Cyber Threat Intelligence Firewall Ransomware Threat Hunting Botnet Patch Management Social Engineering Incident Response Cyber Hygiene VPN Malware Free! Insider Threat Phishing Vulnerability Public Key Infrastructure (PKI) Data Breach SQL Injection DDoS Attack Antivirus Keylogger Two-Factor Authentication (2FA) Dark Web Encryption Penetration Testing Zero- Day Exploit Cyber Threat Intelligence Firewall Ransomware Threat Hunting Botnet Patch Management Social Engineering Incident Response Cyber Hygiene VPN Malware Free! Insider Threat Phishing Vulnerability Public Key Infrastructure (PKI) Data Breach
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SQL Injection
DDoS Attack
Antivirus
Keylogger
Two-Factor Authentication (2FA)
Dark Web
Encryption
Penetration Testing
Zero-Day Exploit
Cyber Threat Intelligence
Firewall
Ransomware
Threat Hunting
Botnet
Patch Management
Social Engineering
Incident Response
Cyber Hygiene
VPN
Malware
Free!
Insider Threat
Phishing
Vulnerability
Public Key Infrastructure (PKI)
Data Breach