Ransomware Social Engineering Antivirus Cyber Threat Intelligence Firewall Two-Factor Authentication (2FA) DDoS Attack Threat Hunting Malware VPN Patch Management SQL Injection Phishing Zero- Day Exploit Data Breach Public Key Infrastructure (PKI) Free! Keylogger Dark Web Botnet Vulnerability Incident Response Encryption Cyber Hygiene Penetration Testing Insider Threat Ransomware Social Engineering Antivirus Cyber Threat Intelligence Firewall Two-Factor Authentication (2FA) DDoS Attack Threat Hunting Malware VPN Patch Management SQL Injection Phishing Zero- Day Exploit Data Breach Public Key Infrastructure (PKI) Free! Keylogger Dark Web Botnet Vulnerability Incident Response Encryption Cyber Hygiene Penetration Testing Insider Threat
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Ransomware
Social Engineering
Antivirus
Cyber Threat Intelligence
Firewall
Two-Factor Authentication (2FA)
DDoS Attack
Threat Hunting
Malware
VPN
Patch Management
SQL Injection
Phishing
Zero-Day Exploit
Data Breach
Public Key Infrastructure (PKI)
Free!
Keylogger
Dark Web
Botnet
Vulnerability
Incident Response
Encryption
Cyber Hygiene
Penetration Testing
Insider Threat