Insider Threat Botnet Encryption Penetration Testing Cyber Threat Intelligence Malware Patch Management VPN Vulnerability Threat Hunting Public Key Infrastructure (PKI) DDoS Attack Data Breach Dark Web Firewall Two-Factor Authentication (2FA) SQL Injection Zero- Day Exploit Antivirus Cyber Hygiene Keylogger Free! Social Engineering Ransomware Incident Response Phishing Insider Threat Botnet Encryption Penetration Testing Cyber Threat Intelligence Malware Patch Management VPN Vulnerability Threat Hunting Public Key Infrastructure (PKI) DDoS Attack Data Breach Dark Web Firewall Two-Factor Authentication (2FA) SQL Injection Zero- Day Exploit Antivirus Cyber Hygiene Keylogger Free! Social Engineering Ransomware Incident Response Phishing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Insider Threat
Botnet
Encryption
Penetration Testing
Cyber Threat Intelligence
Malware
Patch Management
VPN
Vulnerability
Threat Hunting
Public Key Infrastructure (PKI)
DDoS Attack
Data Breach
Dark Web
Firewall
Two-Factor Authentication (2FA)
SQL Injection
Zero-Day Exploit
Antivirus
Cyber Hygiene
Keylogger
Free!
Social Engineering
Ransomware
Incident Response
Phishing