VPNIncidentResponseVulnerabilityFirewallKeyloggerCyberHygieneEncryptionPatchManagementCyberThreatIntelligenceAntivirusDataBreachPublic KeyInfrastructure(PKI)Free!InsiderThreatSQLInjectionDDoSAttackMalwarePhishingDarkWebThreatHuntingRansomwareSocialEngineeringBotnetTwo-FactorAuthentication(2FA)Zero-DayExploitPenetrationTestingVPNIncidentResponseVulnerabilityFirewallKeyloggerCyberHygieneEncryptionPatchManagementCyberThreatIntelligenceAntivirusDataBreachPublic KeyInfrastructure(PKI)Free!InsiderThreatSQLInjectionDDoSAttackMalwarePhishingDarkWebThreatHuntingRansomwareSocialEngineeringBotnetTwo-FactorAuthentication(2FA)Zero-DayExploitPenetrationTesting

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
  1. VPN
  2. Incident Response
  3. Vulnerability
  4. Firewall
  5. Keylogger
  6. Cyber Hygiene
  7. Encryption
  8. Patch Management
  9. Cyber Threat Intelligence
  10. Antivirus
  11. Data Breach
  12. Public Key Infrastructure (PKI)
  13. Free!
  14. Insider Threat
  15. SQL Injection
  16. DDoS Attack
  17. Malware
  18. Phishing
  19. Dark Web
  20. Threat Hunting
  21. Ransomware
  22. Social Engineering
  23. Botnet
  24. Two-Factor Authentication (2FA)
  25. Zero-Day Exploit
  26. Penetration Testing