VPN Incident Response Vulnerability Firewall Keylogger Cyber Hygiene Encryption Patch Management Cyber Threat Intelligence Antivirus Data Breach Public Key Infrastructure (PKI) Free! Insider Threat SQL Injection DDoS Attack Malware Phishing Dark Web Threat Hunting Ransomware Social Engineering Botnet Two-Factor Authentication (2FA) Zero- Day Exploit Penetration Testing VPN Incident Response Vulnerability Firewall Keylogger Cyber Hygiene Encryption Patch Management Cyber Threat Intelligence Antivirus Data Breach Public Key Infrastructure (PKI) Free! Insider Threat SQL Injection DDoS Attack Malware Phishing Dark Web Threat Hunting Ransomware Social Engineering Botnet Two-Factor Authentication (2FA) Zero- Day Exploit Penetration Testing
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPN
Incident Response
Vulnerability
Firewall
Keylogger
Cyber Hygiene
Encryption
Patch Management
Cyber Threat Intelligence
Antivirus
Data Breach
Public Key Infrastructure (PKI)
Free!
Insider Threat
SQL Injection
DDoS Attack
Malware
Phishing
Dark Web
Threat Hunting
Ransomware
Social Engineering
Botnet
Two-Factor Authentication (2FA)
Zero-Day Exploit
Penetration Testing