NmapBackupVPNLeastprivilegeSOCZero-dayAuthenticationAESIoCSQLinjectionAntivirusKeyexchangeBruteforceZerotrustCybercrimeOSINTCSRFWebapplicationfirewallC2serverIDSCross-sitescripting(XSS)AdwareFirewallThreatmodelingISO27001RiskassessmentMFAMalvertisingSQLinjectionSmishingISO27001ForensicanalysisSmishingAESEncryptionZero-dayLeastprivilegePKIVulnerabilityCertificateEndpointsecuritySteganographyMalwareAPTBufferoverflowKeyloggingSandboxingAssetmanagementThreatmodelingDatabreachFirewallAdwareWhitehatBlacklistEDRDigitalforensicsWormBackupClickjackingDarkwebPatchingCloudcomputingsecurityWhalingKeyexchangeSaaSsecurityCybercrimeOSINTThreathuntingSniffingIPSDomainhijackingIncidentresponseTrojanAssetmanagementSecurecodingPrivilegeescalationDigitalfootprintIncidentresponsePhishingExploitSpoofingCyberhygieneHoneypotDDoSReverseengineeringIAMSecurityawarenessIDSTokenizationCyberattackTwo-factorauthenticationCertificateBruteforceSupplychainattackDigitalforensicsTrojanZombieIAMSpywareURLfilteringPenetrationtestingSIEMWateringholeattackFree!DomainhijackingMan-in-the-middleThreathuntingHashingPrivilegeescalationRedteamUACNIDSMalwareTTPsDatabreachWhitehatZerotrustCyberhygieneRansomwareBotnetWormThreatintelligenceCryptographyWebapplicationfirewallC2serverVPNThreatintelligenceRansomwareLDAPTokenizationEncryptionCipherMFADecryptionZombieCAPTCHAProxySIEMVulnerabilityInsiderthreatHashingAuthenticationHoneypotCyberattackEndpointsecurityAntivirusSocialengineeringInsiderthreatSniffingBufferoverflowVishingSpywareDecryptionSupplychainattackDDoSMan-in-the-middleRiskassessmentEDRCloudsecurityQuantumcryptographySOCSecurecodingSpoofingDNSpoisoningUACExploitReverseengineeringCipherBlacklistDarkwebProxyClickjackingDigitalfootprintCloudsecuritySecurityawarenessPhishingScarewareCryptographyBotnetSocialengineeringAPTHeuristicanalysisPenetrationtestingRootkitMalvertisingIPSDMZNmapBackupVPNLeastprivilegeSOCZero-dayAuthenticationAESIoCSQLinjectionAntivirusKeyexchangeBruteforceZerotrustCybercrimeOSINTCSRFWebapplicationfirewallC2serverIDSCross-sitescripting(XSS)AdwareFirewallThreatmodelingISO27001RiskassessmentMFAMalvertisingSQLinjectionSmishingISO27001ForensicanalysisSmishingAESEncryptionZero-dayLeastprivilegePKIVulnerabilityCertificateEndpointsecuritySteganographyMalwareAPTBufferoverflowKeyloggingSandboxingAssetmanagementThreatmodelingDatabreachFirewallAdwareWhitehatBlacklistEDRDigitalforensicsWormBackupClickjackingDarkwebPatchingCloudcomputingsecurityWhalingKeyexchangeSaaSsecurityCybercrimeOSINTThreathuntingSniffingIPSDomainhijackingIncidentresponseTrojanAssetmanagementSecurecodingPrivilegeescalationDigitalfootprintIncidentresponsePhishingExploitSpoofingCyberhygieneHoneypotDDoSReverseengineeringIAMSecurityawarenessIDSTokenizationCyberattackTwo-factorauthenticationCertificateBruteforceSupplychainattackDigitalforensicsTrojanZombieIAMSpywareURLfilteringPenetrationtestingSIEMWateringholeattackFree!DomainhijackingMan-in-the-middleThreathuntingHashingPrivilegeescalationRedteamUACNIDSMalwareTTPsDatabreachWhitehatZerotrustCyberhygieneRansomwareBotnetWormThreatintelligenceCryptographyWebapplicationfirewallC2serverVPNThreatintelligenceRansomwareLDAPTokenizationEncryptionCipherMFADecryptionZombieCAPTCHAProxySIEMVulnerabilityInsiderthreatHashingAuthenticationHoneypotCyberattackEndpointsecurityAntivirusSocialengineeringInsiderthreatSniffingBufferoverflowVishingSpywareDecryptionSupplychainattackDDoSMan-in-the-middleRiskassessmentEDRCloudsecurityQuantumcryptographySOCSecurecodingSpoofingDNSpoisoningUACExploitReverseengineeringCipherBlacklistDarkwebProxyClickjackingDigitalfootprintCloudsecuritySecurityawarenessPhishingScarewareCryptographyBotnetSocialengineeringAPTHeuristicanalysisPenetrationtestingRootkitMalvertisingIPSDMZ

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
  1. Nmap
  2. Backup
  3. VPN
  4. Least privilege
  5. SOC
  6. Zero-day
  7. Authentication
  8. AES
  9. IoC
  10. SQL injection
  11. Antivirus
  12. Key exchange
  13. Brute force
  14. Zero trust
  15. Cybercrime
  16. OSINT
  17. CSRF
  18. Web application firewall
  19. C2 server
  20. IDS
  21. Cross-site scripting (XSS)
  22. Adware
  23. Firewall
  24. Threat modeling
  25. ISO 27001
  26. Risk assessment
  27. MFA
  28. Malvertising
  29. SQL injection
  30. Smishing
  31. ISO 27001
  32. Forensic analysis
  33. Smishing
  34. AES
  35. Encryption
  36. Zero-day
  37. Least privilege
  38. PKI
  39. Vulnerability
  40. Certificate
  41. Endpoint security
  42. Steganography
  43. Malware
  44. APT
  45. Buffer overflow
  46. Keylogging
  47. Sandboxing
  48. Asset management
  49. Threat modeling
  50. Data breach
  51. Firewall
  52. Adware
  53. White hat
  54. Blacklist
  55. EDR
  56. Digital forensics
  57. Worm
  58. Backup
  59. Clickjacking
  60. Dark web
  61. Patching
  62. Cloud computing security
  63. Whaling
  64. Key exchange
  65. SaaS security
  66. Cybercrime
  67. OSINT
  68. Threat hunting
  69. Sniffing
  70. IPS
  71. Domain hijacking
  72. Incident response
  73. Trojan
  74. Asset management
  75. Secure coding
  76. Privilege escalation
  77. Digital footprint
  78. Incident response
  79. Phishing
  80. Exploit
  81. Spoofing
  82. Cyber hygiene
  83. Honeypot
  84. DDoS
  85. Reverse engineering
  86. IAM
  87. Security awareness
  88. IDS
  89. Tokenization
  90. Cyberattack
  91. Two-factor authentication
  92. Certificate
  93. Brute force
  94. Supply chain attack
  95. Digital forensics
  96. Trojan
  97. Zombie
  98. IAM
  99. Spyware
  100. URL filtering
  101. Penetration testing
  102. SIEM
  103. Watering hole attack
  104. Free!
  105. Domain hijacking
  106. Man-in-the-middle
  107. Threat hunting
  108. Hashing
  109. Privilege escalation
  110. Red team
  111. UAC
  112. NIDS
  113. Malware
  114. TTPs
  115. Data breach
  116. White hat
  117. Zero trust
  118. Cyber hygiene
  119. Ransomware
  120. Botnet
  121. Worm
  122. Threat intelligence
  123. Cryptography
  124. Web application firewall
  125. C2 server
  126. VPN
  127. Threat intelligence
  128. Ransomware
  129. LDAP
  130. Tokenization
  131. Encryption
  132. Cipher
  133. MFA
  134. Decryption
  135. Zombie
  136. CAPTCHA
  137. Proxy
  138. SIEM
  139. Vulnerability
  140. Insider threat
  141. Hashing
  142. Authentication
  143. Honeypot
  144. Cyberattack
  145. Endpoint security
  146. Antivirus
  147. Social engineering
  148. Insider threat
  149. Sniffing
  150. Buffer overflow
  151. Vishing
  152. Spyware
  153. Decryption
  154. Supply chain attack
  155. DDoS
  156. Man-in-the-middle
  157. Risk assessment
  158. EDR
  159. Cloud security
  160. Quantum cryptography
  161. SOC
  162. Secure coding
  163. Spoofing
  164. DNS poisoning
  165. UAC
  166. Exploit
  167. Reverse engineering
  168. Cipher
  169. Blacklist
  170. Dark web
  171. Proxy
  172. Clickjacking
  173. Digital footprint
  174. Cloud security
  175. Security awareness
  176. Phishing
  177. Scareware
  178. Cryptography
  179. Botnet
  180. Social engineering
  181. APT
  182. Heuristic analysis
  183. Penetration testing
  184. Rootkit
  185. Malvertising
  186. IPS
  187. DMZ