SQL Injection Penetration Testing Cyber Threat Intelligence Threat Hunting Social Engineering Phishing Free! Vulnerability Dark Web Public Key Infrastructure (PKI) Two-Factor Authentication (2FA) Keylogger Encryption Malware Data Breach Botnet Cyber Hygiene Firewall Zero- Day Exploit Patch Management Incident Response Ransomware Insider Threat VPN DDoS Attack Antivirus SQL Injection Penetration Testing Cyber Threat Intelligence Threat Hunting Social Engineering Phishing Free! Vulnerability Dark Web Public Key Infrastructure (PKI) Two-Factor Authentication (2FA) Keylogger Encryption Malware Data Breach Botnet Cyber Hygiene Firewall Zero- Day Exploit Patch Management Incident Response Ransomware Insider Threat VPN DDoS Attack Antivirus
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SQL Injection
Penetration Testing
Cyber Threat Intelligence
Threat Hunting
Social Engineering
Phishing
Free!
Vulnerability
Dark Web
Public Key Infrastructure (PKI)
Two-Factor Authentication (2FA)
Keylogger
Encryption
Malware
Data Breach
Botnet
Cyber Hygiene
Firewall
Zero-Day Exploit
Patch Management
Incident Response
Ransomware
Insider Threat
VPN
DDoS Attack
Antivirus