Penetration Testing Dark Web Firewall Keylogger DDoS Attack Phishing Cyber Threat Intelligence Two-Factor Authentication (2FA) Encryption SQL Injection Social Engineering Free! Data Breach Antivirus Insider Threat Public Key Infrastructure (PKI) Cyber Hygiene Zero- Day Exploit Ransomware Patch Management VPN Malware Incident Response Botnet Threat Hunting Vulnerability Penetration Testing Dark Web Firewall Keylogger DDoS Attack Phishing Cyber Threat Intelligence Two-Factor Authentication (2FA) Encryption SQL Injection Social Engineering Free! Data Breach Antivirus Insider Threat Public Key Infrastructure (PKI) Cyber Hygiene Zero- Day Exploit Ransomware Patch Management VPN Malware Incident Response Botnet Threat Hunting Vulnerability
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Penetration Testing
Dark Web
Firewall
Keylogger
DDoS Attack
Phishing
Cyber Threat Intelligence
Two-Factor Authentication (2FA)
Encryption
SQL Injection
Social Engineering
Free!
Data Breach
Antivirus
Insider Threat
Public Key Infrastructure (PKI)
Cyber Hygiene
Zero-Day Exploit
Ransomware
Patch Management
VPN
Malware
Incident Response
Botnet
Threat Hunting
Vulnerability