TTPsDarkwebAntivirusRansomwareSOCAdwareMan-in-the-middleIoCCybercrimeZerotrustHashingThreatintelligencePhishingWateringholeattackAPTPenetrationtestingISO27001MalvertisingISO27001DMZHashingCyberhygieneBackupMalvertisingIncidentresponseSocialengineeringEndpointsecurityBotnetWormClickjackingDigitalforensicsRiskassessmentThreatmodelingIDSPrivilegeescalationThreathuntingBlacklistCSRFAuthenticationSIEMThreatintelligenceRiskassessmentInsiderthreatSaaSsecurityTwo-factorauthenticationCyberattackCloudsecurityAssetmanagementBufferoverflowDigitalfootprintCyberhygienePenetrationtestingDatabreachIPSSniffingBotnetDDoSInsiderthreatSpywareRedteamSmishingCAPTCHATokenizationLDAPC2serverC2serverTokenizationOSINTLeastprivilegePrivilegeescalationDecryptionKeyexchangeThreatmodelingURLfilteringBruteforceSOCUACVPNReverseengineeringSupplychainattackThreathuntingProxyRootkitSocialengineeringOSINTQuantumcryptographyCipherTrojanCipherAuthenticationDigitalforensicsPatchingCyberattackPhishingFirewallNIDSIAMAESAntivirusSpoofingDNSpoisoningMFAIAMIPSSecurityawarenessZerotrustForensicanalysisCybercrimeBufferoverflowTrojanSecurityawarenessHoneypotRansomwareCryptographyEDRVulnerabilityCertificateSpoofingIDSExploitVPNAPTSIEMAssetmanagementDarkwebWhitehatSandboxingBackupKeyloggingWhalingMalwareWormDigitalfootprintSmishingZombieDDoSEncryptionReverseengineeringHeuristicanalysisUACExploitKeyexchangeEDRSteganographyWebapplicationfirewallSecurecodingCryptographyDecryptionBlacklistProxyDatabreachCertificateBruteforceAdwareHoneypotZombieWebapplicationfirewallVishingFree!EncryptionZero-dayMalwareSniffingIncidentresponseCross-sitescripting(XSS)SQLinjectionWhitehatSQLinjectionScarewareMan-in-the-middleCloudsecurityClickjackingEndpointsecuritySpywareFirewallLeastprivilegeVulnerabilityNmapCloudcomputingsecurityDomainhijackingSupplychainattackAESMFASecurecodingDomainhijackingPKIZero-dayTTPsDarkwebAntivirusRansomwareSOCAdwareMan-in-the-middleIoCCybercrimeZerotrustHashingThreatintelligencePhishingWateringholeattackAPTPenetrationtestingISO27001MalvertisingISO27001DMZHashingCyberhygieneBackupMalvertisingIncidentresponseSocialengineeringEndpointsecurityBotnetWormClickjackingDigitalforensicsRiskassessmentThreatmodelingIDSPrivilegeescalationThreathuntingBlacklistCSRFAuthenticationSIEMThreatintelligenceRiskassessmentInsiderthreatSaaSsecurityTwo-factorauthenticationCyberattackCloudsecurityAssetmanagementBufferoverflowDigitalfootprintCyberhygienePenetrationtestingDatabreachIPSSniffingBotnetDDoSInsiderthreatSpywareRedteamSmishingCAPTCHATokenizationLDAPC2serverC2serverTokenizationOSINTLeastprivilegePrivilegeescalationDecryptionKeyexchangeThreatmodelingURLfilteringBruteforceSOCUACVPNReverseengineeringSupplychainattackThreathuntingProxyRootkitSocialengineeringOSINTQuantumcryptographyCipherTrojanCipherAuthenticationDigitalforensicsPatchingCyberattackPhishingFirewallNIDSIAMAESAntivirusSpoofingDNSpoisoningMFAIAMIPSSecurityawarenessZerotrustForensicanalysisCybercrimeBufferoverflowTrojanSecurityawarenessHoneypotRansomwareCryptographyEDRVulnerabilityCertificateSpoofingIDSExploitVPNAPTSIEMAssetmanagementDarkwebWhitehatSandboxingBackupKeyloggingWhalingMalwareWormDigitalfootprintSmishingZombieDDoSEncryptionReverseengineeringHeuristicanalysisUACExploitKeyexchangeEDRSteganographyWebapplicationfirewallSecurecodingCryptographyDecryptionBlacklistProxyDatabreachCertificateBruteforceAdwareHoneypotZombieWebapplicationfirewallVishingFree!EncryptionZero-dayMalwareSniffingIncidentresponseCross-sitescripting(XSS)SQLinjectionWhitehatSQLinjectionScarewareMan-in-the-middleCloudsecurityClickjackingEndpointsecuritySpywareFirewallLeastprivilegeVulnerabilityNmapCloudcomputingsecurityDomainhijackingSupplychainattackAESMFASecurecodingDomainhijackingPKIZero-day

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
  1. TTPs
  2. Dark web
  3. Antivirus
  4. Ransomware
  5. SOC
  6. Adware
  7. Man-in-the-middle
  8. IoC
  9. Cybercrime
  10. Zero trust
  11. Hashing
  12. Threat intelligence
  13. Phishing
  14. Watering hole attack
  15. APT
  16. Penetration testing
  17. ISO 27001
  18. Malvertising
  19. ISO 27001
  20. DMZ
  21. Hashing
  22. Cyber hygiene
  23. Backup
  24. Malvertising
  25. Incident response
  26. Social engineering
  27. Endpoint security
  28. Botnet
  29. Worm
  30. Clickjacking
  31. Digital forensics
  32. Risk assessment
  33. Threat modeling
  34. IDS
  35. Privilege escalation
  36. Threat hunting
  37. Blacklist
  38. CSRF
  39. Authentication
  40. SIEM
  41. Threat intelligence
  42. Risk assessment
  43. Insider threat
  44. SaaS security
  45. Two-factor authentication
  46. Cyberattack
  47. Cloud security
  48. Asset management
  49. Buffer overflow
  50. Digital footprint
  51. Cyber hygiene
  52. Penetration testing
  53. Data breach
  54. IPS
  55. Sniffing
  56. Botnet
  57. DDoS
  58. Insider threat
  59. Spyware
  60. Red team
  61. Smishing
  62. CAPTCHA
  63. Tokenization
  64. LDAP
  65. C2 server
  66. C2 server
  67. Tokenization
  68. OSINT
  69. Least privilege
  70. Privilege escalation
  71. Decryption
  72. Key exchange
  73. Threat modeling
  74. URL filtering
  75. Brute force
  76. SOC
  77. UAC
  78. VPN
  79. Reverse engineering
  80. Supply chain attack
  81. Threat hunting
  82. Proxy
  83. Rootkit
  84. Social engineering
  85. OSINT
  86. Quantum cryptography
  87. Cipher
  88. Trojan
  89. Cipher
  90. Authentication
  91. Digital forensics
  92. Patching
  93. Cyberattack
  94. Phishing
  95. Firewall
  96. NIDS
  97. IAM
  98. AES
  99. Antivirus
  100. Spoofing
  101. DNS poisoning
  102. MFA
  103. IAM
  104. IPS
  105. Security awareness
  106. Zero trust
  107. Forensic analysis
  108. Cybercrime
  109. Buffer overflow
  110. Trojan
  111. Security awareness
  112. Honeypot
  113. Ransomware
  114. Cryptography
  115. EDR
  116. Vulnerability
  117. Certificate
  118. Spoofing
  119. IDS
  120. Exploit
  121. VPN
  122. APT
  123. SIEM
  124. Asset management
  125. Dark web
  126. White hat
  127. Sandboxing
  128. Backup
  129. Keylogging
  130. Whaling
  131. Malware
  132. Worm
  133. Digital footprint
  134. Smishing
  135. Zombie
  136. DDoS
  137. Encryption
  138. Reverse engineering
  139. Heuristic analysis
  140. UAC
  141. Exploit
  142. Key exchange
  143. EDR
  144. Steganography
  145. Web application firewall
  146. Secure coding
  147. Cryptography
  148. Decryption
  149. Blacklist
  150. Proxy
  151. Data breach
  152. Certificate
  153. Brute force
  154. Adware
  155. Honeypot
  156. Zombie
  157. Web application firewall
  158. Vishing
  159. Free!
  160. Encryption
  161. Zero-day
  162. Malware
  163. Sniffing
  164. Incident response
  165. Cross-site scripting (XSS)
  166. SQL injection
  167. White hat
  168. SQL injection
  169. Scareware
  170. Man-in-the-middle
  171. Cloud security
  172. Clickjacking
  173. Endpoint security
  174. Spyware
  175. Firewall
  176. Least privilege
  177. Vulnerability
  178. Nmap
  179. Cloud computing security
  180. Domain hijacking
  181. Supply chain attack
  182. AES
  183. MFA
  184. Secure coding
  185. Domain hijacking
  186. PKI
  187. Zero-day