VPNPenetrationTestingSQLInjectionDataBreachIncidentResponseSocialEngineeringPublic KeyInfrastructure(PKI)EncryptionMalwareFree!DDoSAttackDarkWebInsiderThreatZero-DayExploitFirewallBotnetCyberThreatIntelligenceRansomwareVulnerabilityPhishingTwo-FactorAuthentication(2FA)CyberHygieneKeyloggerAntivirusPatchManagementThreatHuntingVPNPenetrationTestingSQLInjectionDataBreachIncidentResponseSocialEngineeringPublic KeyInfrastructure(PKI)EncryptionMalwareFree!DDoSAttackDarkWebInsiderThreatZero-DayExploitFirewallBotnetCyberThreatIntelligenceRansomwareVulnerabilityPhishingTwo-FactorAuthentication(2FA)CyberHygieneKeyloggerAntivirusPatchManagementThreatHunting

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. VPN
  2. Penetration Testing
  3. SQL Injection
  4. Data Breach
  5. Incident Response
  6. Social Engineering
  7. Public Key Infrastructure (PKI)
  8. Encryption
  9. Malware
  10. Free!
  11. DDoS Attack
  12. Dark Web
  13. Insider Threat
  14. Zero-Day Exploit
  15. Firewall
  16. Botnet
  17. Cyber Threat Intelligence
  18. Ransomware
  19. Vulnerability
  20. Phishing
  21. Two-Factor Authentication (2FA)
  22. Cyber Hygiene
  23. Keylogger
  24. Antivirus
  25. Patch Management
  26. Threat Hunting