LDAPWebapplicationfirewallIAMIPSTTPsLeastprivilegeProxyForensicanalysisMalwareCyberattackVishingLeastprivilegeHoneypotExploitSIEMHoneypotReverseengineeringDatabreachSecurityawarenessSocialengineeringSQLinjectionProxyIoCCyberhygieneDomainhijackingMalwareEndpointsecurityAPTIPSBackupExploitDecryptionPhishingThreathuntingDMZSpywareSecurityawarenessFree!Zero-dayClickjackingBruteforceSOCBackupCertificateAPTReverseengineeringRiskassessmentAssetmanagementCipherTwo-factorauthenticationAntivirusMFACybercrimeVPNInsiderthreatURLfilteringSecurecodingPhishingTrojanEDRWhitehatVPNHashingSQLinjectionZombieSniffingAuthenticationDarkwebISO27001AntivirusIncidentresponseNIDSC2serverISO27001IAMEndpointsecurityCloudsecurityDigitalfootprintWebapplicationfirewallFirewallSupplychainattackMalvertisingVulnerabilitySaaSsecuritySmishingBruteforceDigitalforensicsWormDigitalforensicsDecryptionThreatintelligenceOSINTKeyloggingSpoofingRansomwareMFAAssetmanagementAdwareDigitalfootprintRootkitCAPTCHAWhitehatPatchingOSINTUACUACCybercrimeBufferoverflowHashingDatabreachInsiderthreatCyberattackCSRFIncidentresponseWormPrivilegeescalationEDRCryptographySecurecodingSOCRedteamKeyexchangeBotnetRansomwareSniffingTokenizationCryptographySIEMSteganographyIDSCipherSpoofingBlacklistDNSpoisoningMalvertisingWateringholeattackBotnetCyberhygieneAESThreatmodelingRiskassessmentSandboxingBufferoverflowMan-in-the-middleKeyexchangeDDoSThreatmodelingCloudcomputingsecurityTrojanEncryptionAdwareSmishingPKICloudsecurityPenetrationtestingClickjackingHeuristicanalysisScarewareBlacklistDomainhijackingPenetrationtestingWhalingPrivilegeescalationFirewallZombieDDoSSupplychainattackZerotrustQuantumcryptographyTokenizationEncryptionZerotrustNmapAuthenticationSpywareZero-dayC2serverMan-in-the-middleVulnerabilitySocialengineeringIDSAESDarkwebCertificateCross-sitescripting(XSS)ThreathuntingThreatintelligenceLDAPWebapplicationfirewallIAMIPSTTPsLeastprivilegeProxyForensicanalysisMalwareCyberattackVishingLeastprivilegeHoneypotExploitSIEMHoneypotReverseengineeringDatabreachSecurityawarenessSocialengineeringSQLinjectionProxyIoCCyberhygieneDomainhijackingMalwareEndpointsecurityAPTIPSBackupExploitDecryptionPhishingThreathuntingDMZSpywareSecurityawarenessFree!Zero-dayClickjackingBruteforceSOCBackupCertificateAPTReverseengineeringRiskassessmentAssetmanagementCipherTwo-factorauthenticationAntivirusMFACybercrimeVPNInsiderthreatURLfilteringSecurecodingPhishingTrojanEDRWhitehatVPNHashingSQLinjectionZombieSniffingAuthenticationDarkwebISO27001AntivirusIncidentresponseNIDSC2serverISO27001IAMEndpointsecurityCloudsecurityDigitalfootprintWebapplicationfirewallFirewallSupplychainattackMalvertisingVulnerabilitySaaSsecuritySmishingBruteforceDigitalforensicsWormDigitalforensicsDecryptionThreatintelligenceOSINTKeyloggingSpoofingRansomwareMFAAssetmanagementAdwareDigitalfootprintRootkitCAPTCHAWhitehatPatchingOSINTUACUACCybercrimeBufferoverflowHashingDatabreachInsiderthreatCyberattackCSRFIncidentresponseWormPrivilegeescalationEDRCryptographySecurecodingSOCRedteamKeyexchangeBotnetRansomwareSniffingTokenizationCryptographySIEMSteganographyIDSCipherSpoofingBlacklistDNSpoisoningMalvertisingWateringholeattackBotnetCyberhygieneAESThreatmodelingRiskassessmentSandboxingBufferoverflowMan-in-the-middleKeyexchangeDDoSThreatmodelingCloudcomputingsecurityTrojanEncryptionAdwareSmishingPKICloudsecurityPenetrationtestingClickjackingHeuristicanalysisScarewareBlacklistDomainhijackingPenetrationtestingWhalingPrivilegeescalationFirewallZombieDDoSSupplychainattackZerotrustQuantumcryptographyTokenizationEncryptionZerotrustNmapAuthenticationSpywareZero-dayC2serverMan-in-the-middleVulnerabilitySocialengineeringIDSAESDarkwebCertificateCross-sitescripting(XSS)ThreathuntingThreatintelligence

APN Security Awareness Training 2025 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
  1. LDAP
  2. Web application firewall
  3. IAM
  4. IPS
  5. TTPs
  6. Least privilege
  7. Proxy
  8. Forensic analysis
  9. Malware
  10. Cyberattack
  11. Vishing
  12. Least privilege
  13. Honeypot
  14. Exploit
  15. SIEM
  16. Honeypot
  17. Reverse engineering
  18. Data breach
  19. Security awareness
  20. Social engineering
  21. SQL injection
  22. Proxy
  23. IoC
  24. Cyber hygiene
  25. Domain hijacking
  26. Malware
  27. Endpoint security
  28. APT
  29. IPS
  30. Backup
  31. Exploit
  32. Decryption
  33. Phishing
  34. Threat hunting
  35. DMZ
  36. Spyware
  37. Security awareness
  38. Free!
  39. Zero-day
  40. Clickjacking
  41. Brute force
  42. SOC
  43. Backup
  44. Certificate
  45. APT
  46. Reverse engineering
  47. Risk assessment
  48. Asset management
  49. Cipher
  50. Two-factor authentication
  51. Antivirus
  52. MFA
  53. Cybercrime
  54. VPN
  55. Insider threat
  56. URL filtering
  57. Secure coding
  58. Phishing
  59. Trojan
  60. EDR
  61. White hat
  62. VPN
  63. Hashing
  64. SQL injection
  65. Zombie
  66. Sniffing
  67. Authentication
  68. Dark web
  69. ISO 27001
  70. Antivirus
  71. Incident response
  72. NIDS
  73. C2 server
  74. ISO 27001
  75. IAM
  76. Endpoint security
  77. Cloud security
  78. Digital footprint
  79. Web application firewall
  80. Firewall
  81. Supply chain attack
  82. Malvertising
  83. Vulnerability
  84. SaaS security
  85. Smishing
  86. Brute force
  87. Digital forensics
  88. Worm
  89. Digital forensics
  90. Decryption
  91. Threat intelligence
  92. OSINT
  93. Keylogging
  94. Spoofing
  95. Ransomware
  96. MFA
  97. Asset management
  98. Adware
  99. Digital footprint
  100. Rootkit
  101. CAPTCHA
  102. White hat
  103. Patching
  104. OSINT
  105. UAC
  106. UAC
  107. Cybercrime
  108. Buffer overflow
  109. Hashing
  110. Data breach
  111. Insider threat
  112. Cyberattack
  113. CSRF
  114. Incident response
  115. Worm
  116. Privilege escalation
  117. EDR
  118. Cryptography
  119. Secure coding
  120. SOC
  121. Red team
  122. Key exchange
  123. Botnet
  124. Ransomware
  125. Sniffing
  126. Tokenization
  127. Cryptography
  128. SIEM
  129. Steganography
  130. IDS
  131. Cipher
  132. Spoofing
  133. Blacklist
  134. DNS poisoning
  135. Malvertising
  136. Watering hole attack
  137. Botnet
  138. Cyber hygiene
  139. AES
  140. Threat modeling
  141. Risk assessment
  142. Sandboxing
  143. Buffer overflow
  144. Man-in-the-middle
  145. Key exchange
  146. DDoS
  147. Threat modeling
  148. Cloud computing security
  149. Trojan
  150. Encryption
  151. Adware
  152. Smishing
  153. PKI
  154. Cloud security
  155. Penetration testing
  156. Clickjacking
  157. Heuristic analysis
  158. Scareware
  159. Blacklist
  160. Domain hijacking
  161. Penetration testing
  162. Whaling
  163. Privilege escalation
  164. Firewall
  165. Zombie
  166. DDoS
  167. Supply chain attack
  168. Zero trust
  169. Quantum cryptography
  170. Tokenization
  171. Encryption
  172. Zero trust
  173. Nmap
  174. Authentication
  175. Spyware
  176. Zero-day
  177. C2 server
  178. Man-in-the-middle
  179. Vulnerability
  180. Social engineering
  181. IDS
  182. AES
  183. Dark web
  184. Certificate
  185. Cross-site scripting (XSS)
  186. Threat hunting
  187. Threat intelligence